FINDING · DEFENSE

Using Byzantine-fault-tolerant protocols (specifically Rampart), seven replicas suffice to resist a conspiracy of any two malicious administrators or the accidental destruction of four systems with guaranteed complete recovery. Signing all files with a system key further ensures that a full recovery is possible as long as a single valid copy and an uncompromised public key survive.

From 1996-anderson-eternityThe Eternity Service · §4.6 · 1996 · Theory and Applications of Cryptology

Implications

Tags

censors
generic
techniques
ip-blocking
defenses
meta-resistance

Extracted by claude-sonnet-4-6 — review before relying.