On Fri, Dec 17, 2010 at 4:03 PM, Loic Dachary <[email protected]> wrote:

>
> I will reveal my ignorance: what is an "adversary model" ?
>

Simply define what a malicious user could potentially do to break your
system.
Sniffing packets/blocking packets/subverting routing/message-bombing the
network/...the list can be as long as you want.


> A user finds the answer to question Q by sending a request to the DHT
> node responsible for Q (the question Q is hashed into a DHT key). A
> malicious node may try to impersonate the node responsible for Q and
> return an answer that is irrelevant.
>

Maybe you should look into sybil-attack resilient DHTs.

cheers,
valerio
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to