Sybil attack?

Natanael natanael.l at gmail.com
Tue Feb 17 10:47:41 UTC 2015


Den 17 feb 2015 07:56 skrev "str4d" <str4d at i2pmail.org>:

> Other than that, there is no difference. Non-honest Tahoe-LAFS nodes
> are perfectly capable of joining a standard Tahoe-LAFS network and
> sending fake replies. So any Sybil attack on the I2P Tahoe-LAFS
> network would be directly applicable to a standard Tahoe-LAFS network.

How would somebody go around connecting to let's say my home network with a
couple of Tahoe-LAFS nodes and pretending to be storage nodes holding oat
of my data? Wouldn't most Tahoe-LAFS setups whitelist storage nodes, or
otherwise simply not be open for others to connect to?

The I2P version allows anybody to act as a storage node, and get
connections from clients looking for data.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://tahoe-lafs.org/pipermail/tahoe-dev/attachments/20150217/1026c88d/attachment.html>


More information about the tahoe-dev mailing list