LimLims
Member
I'm particularly interested in documenting a list of known attack vectors, any implemented or theoretical defences, and in quantifying the cost of mounting attack, and the risk & likelihood of losing anonymity / coins.
Perhaps we could open the discussion by talking through possible Sybil attacks. http://en.wikipedia.org/wiki/Sybil_attack
Perhaps we could open the discussion by talking through possible Sybil attacks. http://en.wikipedia.org/wiki/Sybil_attack