• 0 Posts
  • 2 Comments
Joined 2 days ago
cake
Cake day: 7 November 2024

help-circle
  • The attacker can just be smarter and use various ASNs + out-proxies for their backend.

    My background is small-world network in distributed systems and anti-censorship software like Hyphanet. If the goal is to evict/lessen the purview of the metadata harvesting nodes then some version of web-of-trust + proof of work could be implemented.