<div dir="ltr"><div><div><div>Hi Natanael<br>Thanks for answering. Really I'm noob in this area.<br><br></div>I wanted to use I2P version. So, it's no possible way present or future to block it? It's a really threat?<br></div>Can you explainme better what it means "configured to mimic Freenet"?<br><br></div>Thanks a lot<br><div class="gmail_extra"><br><br></div><div class="gmail_extra">Adonay<br><br></div><div class="gmail_extra"><br><div class="gmail_quote">2015-02-16 12:14 GMT+01:00 Natanael <span dir="ltr"><<a href="mailto:natanael.l@gmail.com" target="_blank">natanael.l@gmail.com</a>></span>:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><p dir="ltr"><br>
Den 16 feb 2015 11:42 skrev "Adonay Sanz" <<a href="mailto:adonay.sanz@gmail.com" target="_blank">adonay.sanz@gmail.com</a>>:<span class=""><br>
><br>
> Hi,<br>
> I'm reading your documentation and has Tahoe-LAFS any sybil attack protection? or does it really matter? Can be implemented some solution?</span></p>
<p dir="ltr">Tahoe-LAFS in the default configuration don't rely on unknown nodes, so there Sybil isn't a problem. And because of in-built authentication of all data, a Sybil attack could at most prevent access to the data (or just to chosen parts of or versions of the data), a form of denial of service. Can't fake the data.</p>
<p dir="ltr">The I2P version could be affected (as it is configured to mimic Freenet). Standard usage isn't.</p>
</blockquote></div><br></div></div>