FINDING · DEFENSE

An adversary who wishes to expose storers by having forwarders log storer identities must compromise all n−k+1 chosen forwarders before or during the publication event; forwarders that legitimately delete the storer mapping immediately after acknowledging publication render this attack ineffective unless the adversary pre-positions malicious nodes at sufficient density. The paper notes that with a reasonably large forwarder population the probability of the required simultaneous compromise is small.

From 2002-serjantov-anonymizingAnonymizing Censorship Resistant Systems · §3 · 2002 · International Workshop on Peer-To-Peer Systems

Implications

Tags

censors
generic
defenses
meta-resistance

Extracted by claude-sonnet-4-6 — review before relying.