On Fri, Dec 17, 2010 at 4:03 PM, Loic Dachary <[email protected]> wrote:
> > I will reveal my ignorance: what is an "adversary model" ? > Simply define what a malicious user could potentially do to break your system. Sniffing packets/blocking packets/subverting routing/message-bombing the network/...the list can be as long as you want. > A user finds the answer to question Q by sending a request to the DHT > node responsible for Q (the question Q is hashed into a DHT key). A > malicious node may try to impersonate the node responsible for Q and > return an answer that is irrelevant. > Maybe you should look into sybil-attack resilient DHTs. cheers, valerio
_______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
