Check out the new USENIX Web site. next up previous
Next: Share deletion or corruption Up: Publius: A robust, tamper-evident, Previous: User interface

   
Limitations and threats

In this section we discuss the limitations of Publius and how these limitations could be used by an adversary to censor a published document, disrupt normal Publius operation, or learn the identity of an author of a particular document. Possible countermeasures for some of these attacks are also discussed.

 

Avi Rubin
2000-06-13