-
- Downloads
killed the loops and the PRNGs by having the tunnel participants themselves specify what
tunnel ID they listen on and make sure the previous peer doesn't change over time. The worst that a hostile peer could do is create a multiplicative work factor - they send N messages, causing N*#hops in the loop of bandwidth usage. This is identical to the hostile peer simply building a pair of tunnels and sending N messages through them. also added some discussion about the tradeoffs and variations wrt fixed size tunnel messages.
Loading
Please register or sign in to comment