> On 2012-07-17 8:48 AM, nir izraeli wrote:
> > "spam" in the sense of extra unwanted "tags"?
> > I can't see how this can't already be done with current DHT implementations.
> > one who can add "tags" could also add "files" spam.
> 
> One thousand people trying to take over other people's computers issue
> one thousand trojans  Each of them then issues ten million search terms
> to point to his trojan, for a total of ten billion tags.  (That is
> roughly the problem faced by the Pirate Bay)
> 
> I'm out of my depth here, but I don't see why its so difficult to defend 
> against denial of service attacks.  You listen for certain things on certain 
> ports, each has an appropriate sized buffer and when that's full you block 
> the port. Can't a simple buffer full, block port routine be run at a level 
> that is secure from Trojans?

Along these same lines, I was wondering if a "proof of work" element to a 
search request might also help against the ten billion problem.

-Scott

_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to