We touch upon overlay design for censorship-resistant publishing systems last year, which talks about some of the major requirements as well as relation between different concepts. We also discussed some of the attacks on Freenet as well as Tor Bridges.. E. Vasserman, R. Jansen, J. Tyra, N. Hopper, Yongdae Kim , "Membership-concealing overlay networks", ACM Conference on Computer and Communications Security (CCS), 2009 Yongdae -- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + Yongdae Kim (office phone) 1-612-626-7526 + Associate Professor, University of Minnesota - Twin Cities + kyd (at mark) cs.umn.edu, http://www.cs.umn.edu/~kyd +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE