Comment by Ray20
7 days ago
How relevant is this in the context of the mesh networks under discussion?
How resilient are those protocols to attacks on the integrity of the network, when most (or signicant part) of the nodes are controlled by a bad actor and deliberately operate in a mode that prevents the functioning of the network?
No comments yet
Contribute on Hacker News ↗