14 Nov
2019
14 Nov
'19
2:28 a.m.
On Thu, 14 Nov 2019 12:06:19 +1100 Zenaan Harkness <zen@freedbms.net> wrote:
On Wed, Nov 13, 2019 at 07:06:26PM -0300, Punk-Stasi 2.0 wrote:
Here are some possible network topologies/ connection models, which may (or may not) provide any such improvement:
- split connections / connection bonding / massive micro routes etc
- enter the network, and access network and data/cache resources, through some number of simultaneous routes, rather than only one
the article I linked and a few others describe some systems that use redundant routes, lookups and the like to avoid attacks by compromised nodes. Not sure yet if any of them actually work or just academic garbage.