Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[octopusdht] should the implementation include active attacks detection? #31

Open
gpestana opened this issue May 15, 2019 · 0 comments
Open

Comments

@gpestana
Copy link
Member

The OctopusDHT lookup assumes that active adversaries are detected and removed from the network by turning nodes into "shadow nodes" that use anonymous full routing table requests to verify if other peers are modifying the routing table (active attacks). Should this protocol be implemented too, or should we focus only on the multipath lookup with dummy queries?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant