|
|
|
|
|
|
|
|
|
|
|
|
|
|
l |
Use active
networking techniques for
|
|
|
replacement
of single-hop protocols
|
|
|
l |
Completely
decentralized
|
|
|
|
– |
Any node
(person) can create a new protocol & pass
|
|
to its peer
|
|
|
|
– |
Rapid response
time to censorship
|
|
|
|
– |
Nodes can
customize for their environment
|
|
|
l |
Unbounded set
of protocols
|
|
|
|
– |
Attacker
cannot even know what percentage of set
|
|
|
they have
discovered
|
|