Hacker News new | past | comments | ask | show | jobs | submit login

Do you know of any good resources talking about considerations for handling adversarial nodes in these networks? For example, what's to stop a rogue implementation from advertising that it has a low cost / short distance to every other node it's ever seen, reporting that data has been sent successfully that actually wasn't, etc? These links give some good background but I haven't seen anything on there about trust in a hostile environment.



Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: