summaryrefslogtreecommitdiff
path: root/doc/spec/proposals/ideas/xxx-bridge-disbursement.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/spec/proposals/ideas/xxx-bridge-disbursement.txt')
-rw-r--r--doc/spec/proposals/ideas/xxx-bridge-disbursement.txt4
1 files changed, 4 insertions, 0 deletions
diff --git a/doc/spec/proposals/ideas/xxx-bridge-disbursement.txt b/doc/spec/proposals/ideas/xxx-bridge-disbursement.txt
index 24ee9ea865..653630c592 100644
--- a/doc/spec/proposals/ideas/xxx-bridge-disbursement.txt
+++ b/doc/spec/proposals/ideas/xxx-bridge-disbursement.txt
@@ -168,3 +168,7 @@ IP-based.
Denial of service attacks
A good view of network topology
+at some point we should learn some reliability stats on our bridges. when
+we say above 'give out k bridges', we might give out 2 reliable ones and
+k-2 others. we count around the ring the same way we do now, to find them.
+