I was reading about the sybil attack and am unclear on some details.
After becoming part of the peer-to-peer network, the adversary may then overhear communications or act maliciously. By masquerading and presenting multiple identities, the adversary can control the network substantially.
To me some information was skipped over here. So with the sybil attack one entity (e.g. one person on one computer) can have multiple identities (e.g. look like they are several torrent clients) so what? How does this "control the network"?
Aucun commentaire:
Enregistrer un commentaire