-
Which means that only attackers that follow the protocol are considered. If Bob, creates enough nodes for Alice to only be connected to Bob nodes then Bob could simply censor Alice by not relaying any of the messages (which is not as per the protocol). Is there any reason why this scenario is excluded? Am I missing something? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
Thanks, @D4nte for opening the discussion!
Your attack scenario is valid, but it is not discussed in the security analysis section since the adversarial model targets passive adversaries i.e., those who follow the protocol. If everyone follows the instructions then such an attack would never happen.
The Sybil attack is not excluded, it is just not considered an attack under the defined adversarial model. Feel free to share such attack scenarios in this discussion, will cover them in the next round of security analysis that is for active adversaries. Some general thoughts about Sybil/Eclipse attack:
|
Beta Was this translation helpful? Give feedback.
Thanks, @D4nte for opening the discussion!
Your attack scenario is valid, but it is not discussed in the security analysis section since the adversarial model targets passive adversaries i.e., those who follow the protocol. If everyone follows the instructions then such an attack would never happen.
The Sybil attack is not excluded, it is just not considered an attack under the defined adversarial model.
Sybil / Eclipse attacks fit the active/malicious adver…