FINDING · EVALUATION

In the Clouds P2P protocol, a blocking attack against a specific topic requires adversaries to occupy at least 50% of the 200-peer region closest to the resource provider to be effective; below that threshold, query messages routed through multiple paths bypass the censorship. This 50% threshold holds regardless of the number of clouds κ created per peer.

From 2009-backes-anonymityAnonymity and Censorship Resistance in Unstructured Overlay Networks · §5.4 · 2009 · On the Move to Meaningful Internet Systems

Implications

Tags

censors
generic
techniques
ip-blocking
defenses
meta-resistance

Extracted by claude-sonnet-4-6 — review before relying.