Hi!

On 16:25 Tue 14 Jun     , Michael Rogers wrote:
> On 14/06/11 04:42, Julian Cain wrote:
...
> > The number of dissident operated devices need only outweigh a
> > "regime" in order to protect the network. The same rules apply to
> > most overlay networks.
> 
> Not really - most P2P and wireless overlays can be jammed by a small
> number of malicious nodes, including the mesh protocols that have been
> discussed for these "internet in a suitcase" type ideas.

At least the layer 3 can be hardened against dos. Take a look at:
http://michaelblizek.twilightparadox.com/projects/cor/resilience.html

        -Michi

_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to