t; to obtain new addresses as they change due to churn, but mapping the whole
> network requires multiple identities and so once again incurs a linear cost.
> [2]
>
> Best of luck with your project!
>
> [1] Sybil attack (http://www.cs.rice.edu/Conferences/IPTPS02/101.pdf)
> [2] Arc
ed to use multiple ASPs to be protected, much like you need to
use relays in Tor from
multiple ISPs.
> --Aaron
>
> On Wed, Jul 13, 2011 at 11:47 AM, Nick Jones (mailto:najo...@cs.princeton.edu)> wrote:
> > Hi All,
> >
> > I'm a graduate student at Princet
ould gain
fast, anonymous network access through COR for only pennies per day.
Thanks!
Nick Jones
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev