FINDING · EVALUATION
In the Clouds P2P protocol, a blocking attack against a specific topic requires adversaries to occupy at least 50% of the 200-peer region closest to the resource provider to be effective; below that threshold, query messages routed through multiple paths bypass the censorship. This 50% threshold holds regardless of the number of clouds κ created per peer.
From 2009-backes-anonymity — Anonymity and Censorship Resistance in Unstructured Overlay Networks · §5.4 · 2009 · On the Move to Meaningful Internet Systems
Implications
- Route query and answer messages through multiple independent paths to force censors to achieve majority control of a network region rather than blocking a single chokepoint.
- Decouple the number of redundancy paths from anonymity set size so each can be tuned independently without degrading the other property.
Tags
Extracted by claude-sonnet-4-6 — review before relying.