Next: Share deletion or corruption
Up: Publius: A robust, tamper-evident,
Previous: User interface
Limitations and threats
In this section we discuss the limitations of Publius
and how these limitations could be used by an adversary
to censor a published document, disrupt normal Publius
operation, or learn the identity of an author of
a particular document. Possible countermeasures
for some of these attacks are also discussed.
Avi Rubin
2000-06-13