aboutsummaryrefslogtreecommitdiff
path: root/spec/hspow-spec/analysis-discussion.md
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2023-11-09 21:08:55 -0500
committerNick Mathewson <nickm@torproject.org>2023-11-09 21:08:55 -0500
commit02b2f51fa802ca5d8e2d9d2ed71ee58d953fa488 (patch)
treef9fc05da6e9303f6a705fb7b20186fc6e2dff696 /spec/hspow-spec/analysis-discussion.md
parentdb5400a93658fc6fbf323d8ddccef988cd9cf508 (diff)
downloadtorspec-02b2f51fa802ca5d8e2d9d2ed71ee58d953fa488.tar.gz
torspec-02b2f51fa802ca5d8e2d9d2ed71ee58d953fa488.zip
hspow: wrap a REF in brackets.
Diffstat (limited to 'spec/hspow-spec/analysis-discussion.md')
-rw-r--r--spec/hspow-spec/analysis-discussion.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/spec/hspow-spec/analysis-discussion.md b/spec/hspow-spec/analysis-discussion.md
index 8f25623..e021b85 100644
--- a/spec/hspow-spec/analysis-discussion.md
+++ b/spec/hspow-spec/analysis-discussion.md
@@ -226,7 +226,7 @@ This is just the beginning in DoS defences for Tor and there are various future
We could use more advanced memory-hard PoW schemes like MTP-argon2 or Itsuku to make it even harder for adversaries to create successful PoWs. Unfortunately these schemes have much bigger proof sizes, and they won't fit in INTRODUCE1 cells. See #31223 for more details.
- "Third-party anonymous credentials" --
- We can use anonymous credentials and a third-party token issuance server on the clearnet to issue tokens based on PoW or CAPTCHA and then use those tokens to get access to the service. See [REF_CREDS] for more details.
+ We can use anonymous credentials and a third-party token issuance server on the clearnet to issue tokens based on PoW or CAPTCHA and then use those tokens to get access to the service. See `[REF_CREDS]` for more details.
- "PoW + Anonymous Credentials" --
We can make a hybrid of the above ideas where we present a hard puzzle to the user when connecting to the onion service, and if they solve it we then give the user a bunch of anonymous tokens that can be used in the future.