Matthew Toseland wrote: > Hmmm but does it work? Does it prevent Sybil? Good question... Matteo (who wrote the neighbourhood maps paper) pointed me towards two papers that use network flow algorithms to prevent Sybil attacks: http://p2pecon.berkeley.edu/pub/p243-EC04.pdf http://people.cornell.edu/pages/ejf27/pfiles/sybils.pdf
Sounds like it might be similar to the approach used by Advogato: http://www.advogato.org/trust-metric.html Cheers, Michael
