diff options
author | Nick Mathewson <nickm@torproject.org> | 2023-11-09 21:08:55 -0500 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2023-11-09 21:08:55 -0500 |
commit | 02b2f51fa802ca5d8e2d9d2ed71ee58d953fa488 (patch) | |
tree | f9fc05da6e9303f6a705fb7b20186fc6e2dff696 /spec/hspow-spec | |
parent | db5400a93658fc6fbf323d8ddccef988cd9cf508 (diff) | |
download | torspec-02b2f51fa802ca5d8e2d9d2ed71ee58d953fa488.tar.gz torspec-02b2f51fa802ca5d8e2d9d2ed71ee58d953fa488.zip |
hspow: wrap a REF in brackets.
Diffstat (limited to 'spec/hspow-spec')
-rw-r--r-- | spec/hspow-spec/analysis-discussion.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/spec/hspow-spec/analysis-discussion.md b/spec/hspow-spec/analysis-discussion.md index 8f25623..e021b85 100644 --- a/spec/hspow-spec/analysis-discussion.md +++ b/spec/hspow-spec/analysis-discussion.md @@ -226,7 +226,7 @@ This is just the beginning in DoS defences for Tor and there are various future We could use more advanced memory-hard PoW schemes like MTP-argon2 or Itsuku to make it even harder for adversaries to create successful PoWs. Unfortunately these schemes have much bigger proof sizes, and they won't fit in INTRODUCE1 cells. See #31223 for more details. - "Third-party anonymous credentials" -- - We can use anonymous credentials and a third-party token issuance server on the clearnet to issue tokens based on PoW or CAPTCHA and then use those tokens to get access to the service. See [REF_CREDS] for more details. + We can use anonymous credentials and a third-party token issuance server on the clearnet to issue tokens based on PoW or CAPTCHA and then use those tokens to get access to the service. See `[REF_CREDS]` for more details. - "PoW + Anonymous Credentials" -- We can make a hybrid of the above ideas where we present a hard puzzle to the user when connecting to the onion service, and if they solve it we then give the user a bunch of anonymous tokens that can be used in the future. |