home | log | search | bash | stats | wiki


Matches for sybil, 79 total results Sorted by newest | relevance

Mon Nov 16 01:15:10 UTC 2015  <adlai>   testingthisstuff: also fyi, even the tor developers admit to the ease (~$1M) with which a large-scale sybil attack can be mounted against the network

Tue Sep 15 19:42:24 UTC 2015  <thestringpuller>   mats: in my perspective it seems the meatwot is more easily susceptible sybil attacks than one enforced with the principle governing gpg contracts

Thu Sep 10 00:22:48 UTC 2015  <asciilifeform>   if it isn't, it is rather like merely an expensive sort of 'sybil'

Thu Aug 27 01:12:36 UTC 2015  <mats>   'psycho pass' is about a japan where devices that can measure mental health are on every street corner, managed by an entity known as the 'sybil system' and enforced by public security. the focus of the story is a public security officer

Tue Aug 25 01:56:01 UTC 2015  <mircea_popescu>   also hanbot has it : idempotence IS fundamental to bitcoin. but unlike shit like sybil attack, or pgp, which were scarcely used or thought about before we came around,

Tue Aug 25 01:49:30 UTC 2015  <mircea_popescu>   2. sybil. the purpose is irrelevant. all mitm is a degenberate case of sybil.

Tue Aug 25 01:49:07 UTC 2015  <asciilifeform>   (the purpose of a sybil is not necessarily to deceive the victim into transacting with a known party through it)

Tue Aug 25 01:48:39 UTC 2015  <asciilifeform>   mircea_popescu: sybil and mitm are entirely orthogonal concepts

Tue Aug 25 01:48:05 UTC 2015  <mircea_popescu>   and i think sybil covers mitm

Tue Aug 25 01:36:51 UTC 2015  <mike_c>   I'm sticking by it. Once you know what a sybil attack is, this is a good venue to learn why what you know isn't quite right.

Tue Aug 25 01:35:38 UTC 2015  <mike_c>   Adlai: my point wasn't that we're a bunch of geniuses, more that there are better venues to learn something in depth like what is a sybil attack.

Tue Aug 25 01:00:48 UTC 2015  <asciilifeform>   'd' - 'what is meant by a sybil attack?'

Sat Jul 25 03:01:58 UTC 2015  <decimation>   ^ all biometrics fall to similar kinds of sybil attacks

Tue Jul 07 14:35:47 UTC 2015  <decimation>   yes, but your sybil objection applies to all of bitcoin

Tue May 05 01:50:43 UTC 2015  <livegnik>   You could put it that way, yes. But it can visualize sybil swarms by showing the few 'real IDs' linking to it.

Tue May 05 01:47:27 UTC 2015  <livegnik>   asciilifeform: Mostly a whitelist. Whitelisting solves the Sybil. The thing is, whitelisting hasn't been very user-friendly up till now, without the security trade-off.

Tue May 05 01:46:21 UTC 2015  <asciilifeform>   livegnik: what is involved in a 'sybil-proof' wot for machines ?

Tue May 05 01:45:43 UTC 2015  <livegnik>   It's a protocol for identity management for both humans, entities, and machines. It gives the ability to create Sybil-proof WoTs (to the extent that the least trustworthy node added, decides the strength of your security), for almost anything.

Thu Mar 26 00:29:36 UTC 2015  <mike_c>   mircea_popescu: maybe not. could be a much dumber reason. "It's all one node just with 600 addresses. This is what happens when you fucking pay people to sybil attack the network."

Tue Mar 24 07:43:31 UTC 2015  <*>   ben_vulpes suspects a sybil

« Previous Page    Next Page »