Le 13/05/2014 23:01, grarpamp a écrit :
On Tue, May 13, 2014 at 2:21 PM, Roger Dingledine<[email protected]>  wrote:
>One way forward is application-level solutions -- logins, reputation,
>social network connectivity, etc -- that are less likely to be
>indistinguishably shared by both your users and your adversary.
That's definitely true, but other than for key central nodes,
it tends to break down in practice when scaled to 10k, 100k,
1M+ users. Seems to me part of the way is to layer these apps
on anonymous nets and scale those nets up. Lots of research to
do there. Even into nets that meet certain 'good enough for criteria
X' levels of layering upon.


Using your google or twitter account to secure you communications (like webRTC is planning to do to secure the DTLS self-signed certificates) seems not appopriate at all to me, you are increasing unnecessarly the (already huge) influence of these entities which can become the attackers.

--
Peersm : http://www.peersm.com
node-Tor : https://www.github.com/Ayms/node-Tor
GitHub : https://www.github.com/Ayms

_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to