8 Dec
2015
8 Dec
'15
4:51 a.m.
On Mon, Dec 7, 2015 at 11:09 PM, Jonathan Wilkes <jancsika@yahoo.com> wrote:
Say a well-funded attacker takes the Carnegie Mellon deanonymization attack and introduces Sybil slowly over several months.
The graph would look like this... https://metrics.torproject.org/networksize.html?graph=networksize&start=2007-07-04&end=2015-12-08
What then is the defense?
Pray.