whitepaper icon indicating copy to clipboard operation
whitepaper copied to clipboard

Clarify attack mitigations

Open mhluongo opened this issue 8 years ago • 0 comments

Re-organize to describe fundamental attacks and mitigations.

  • Malicious computation, which is mitigated by zk-proofs
  • Collusion against confidentiality, mitigated by tattle-tales and canary bounties
  • Data withholding, mitigated by the safe shutdown protocol

mhluongo avatar Oct 02 '17 23:10 mhluongo