Hi! On 16:25 Tue 14 Jun , Michael Rogers wrote: > On 14/06/11 04:42, Julian Cain wrote: ... > > The number of dissident operated devices need only outweigh a > > "regime" in order to protect the network. The same rules apply to > > most overlay networks. > > Not really - most P2P and wireless overlays can be jammed by a small > number of malicious nodes, including the mesh protocols that have been > discussed for these "internet in a suitcase" type ideas.
At least the layer 3 can be hardened against dos. Take a look at: http://michaelblizek.twilightparadox.com/projects/cor/resilience.html -Michi _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
