Comment by a3_nm
7 years ago
I'm a bit puzzled about this: how do they plan to enforce such a cap in a distributed network? Doesn't this require distributed trust (about multiple users accounting the usage of each client)? Or are they assuming that the network will only consist of their phones running their unmodified software, so each phone can be trusted to do their accounting honestly?
Perhaps you only need to do the accounting at the exit nodes? That means you only need to trust the exit nodes, and identities included in the packets.