On Tue, May 13, 2014 at 2:21 PM, Roger Dingledine <[email protected]> wrote:
> One way forward is application-level solutions -- logins, reputation,
> social network connectivity, etc -- that are less likely to be
> indistinguishably shared by both your users and your adversary.

That's definitely true, but other than for key central nodes,
it tends to break down in practice when scaled to 10k, 100k,
1M+ users. Seems to me part of the way is to layer these apps
on anonymous nets and scale those nets up. Lots of research to
do there. Even into nets that meet certain 'good enough for criteria
X' levels of layering upon.

> (And yes, please don't use Tor for your filesharing traffic; I hear
> there are other tools and networks more suited for bulk transfer.)

I2P is one of those, and few true torizens will actually instruct users
on using Tor for that, thankfully, while Tor figures out its scaling issues.
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to