FINDING · EVALUATION

The surrounding attack on peer anonymity is also effective only when adversaries control at least 50% of the ~100 semantically closest peers to the target; at 25% malicious peers, at least 10 honest peers still join the target's cloud at every step of the joining algorithm, preserving k-anonymity.

From 2009-backes-anonymityAnonymity and Censorship Resistance in Unstructured Overlay Networks · §5.2 · 2009 · On the Move to Meaningful Internet Systems

Implications

Tags

censors
generic
techniques
flow-correlation
defenses
meta-resistance

Extracted by claude-sonnet-4-6 — review before relying.