Matthew Toseland wrote:
> Hmmm but does it work? Does it prevent Sybil?

Good question... Matteo (who wrote the neighbourhood maps paper) pointed 
me towards two papers that use network flow algorithms to prevent Sybil 
attacks:
http://p2pecon.berkeley.edu/pub/p243-EC04.pdf
http://people.cornell.edu/pages/ejf27/pfiles/sybils.pdf

Sounds like it might be similar to the approach used by Advogato:
http://www.advogato.org/trust-metric.html

Cheers,
Michael

Reply via email to