[146359] in cryptography@c2.net mail archive
Re: [Cryptography] Implementations, attacks on DHTs, Mix Nets?
daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Sun Aug 25 19:35:25 2013
X-Original-To: cryptography@metzdowd.com
Date: Sun, 25 Aug 2013 19:35:08 -0400
From: "Perry E. Metzger" <perry@piermont.com>
To: Ralph Holz <ralph-cryptometzger@ralphholz.de>
In-Reply-To: <521A5C16.9090200@ralphholz.de>
Cc: cryptography@metzdowd.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
On Sun, 25 Aug 2013 21:33:42 +0200 Ralph Holz
<ralph-cryptometzger@ralphholz.de> wrote:
> On 08/25/2013 09:12 PM, Perry E. Metzger wrote:
> > For some research on communications privacy I'm doing at the
> > moment, I'm interested in learning about the state of the art of
> > DHT systems and mix network systems. I'd like to know both which
> > systems are
>
> Can you rephrase whether you want info about DHT systems that are
> related to some kind of mix system (e.g. GNUnet), or whether you
> simply want to know about common DHT systems. If the latter, what
> kind of attacks are you after? Eclipse?
My knowledge of the field is pretty spotty in general as I've never
paid much attention up until now -- mostly I know about how people
have built DHTs in non-hostile environments. I'm close enough to
starting from scratch that I don't know yet what I don't know.
Perry
--
Perry E. Metzger perry@piermont.com
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography