I wonder what the standard adversary model is for DHTs, and what happens when some significant fraction of participants are malicious.
pgpsBovA35dOH.pgp
Description: PGP signature
_______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
