Hi!

On Sun, Jul 14, 2013 at 10:25 AM, Caleb James DeLisle
<calebdeli...@lavabit.com> wrote:
> The most scary general attack on the idea is a node who drops 10% of the
> packets sent through them. I don't know how to detect it statelessly and
> they can do quite a bit of damage.

Exactly. You don't have to black hole everything, just enough to make
the network behave badly.

> Again though the physical reality of the network comes in to play.

A "physical reality" in your case means the tunnels between nodes, not
necessary the real-world physical distance?

So you have tunnels between nodes and you assume that those tunnels
are established based on some trust?

And you route along the tunnels? I thought that you route along the
Kademlia distance between keys of nodes. So if my key ID is closer to
node B than to node C, I send packet to node B. And it does not matter
how the tunnels are setup. It seems I misunderstood something then.
This is then quite different than Kademlia. And from whitepaper:

"The "address space distance" between any two given addresses is
defined as the of the result of the two addresses XOR'd against one
another, rotated 64 bits, then interpreted as a big endian integer."

So where does this definition of distance take into the account that
there is trust between two addresses but no trust between some other
two addresses?


Mitar

-- 
http://mitar.tnode.com/
https://twitter.com/mitar_m
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to