I wonder what the standard adversary model is for DHTs, and what happens
when some significant fraction of participants are malicious.

Attachment: pgpsBovA35dOH.pgp
Description: PGP signature

_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to