mirror of
https://github.com/vacp2p/rfc.git
synced 2025-01-26 23:01:03 +00:00
itemizes the adversarial model
This commit is contained in:
parent
f6c3d0a039
commit
fe8b0245d2
@ -64,8 +64,10 @@ The `WakuFilter` protocol supports the following security features.
|
||||
The term Personally identifiable information (PII) refers to any piece of data that can be used to uniquely identify a user. For example, the signature verification key, and the hash of one's static IP address are unique for each user and hence count as PII.
|
||||
|
||||
# Adversarial Model
|
||||
- Any node talking the `WakuFilter` protocol i.e., both the subscriber node and the queried node are considered as an adversary. Furthermore, we consider the adversary as a passive entity that attempts to collect information from other nodes to conduct an attack but it does so without violating protocol definitions and instructions. For example, under the passive adversarial model, no malicious node intentionally hides the messages matching to one's subscribed content filter as it is against the description of the `WakuFilter` protocol.
|
||||
- The following are not considered as part of the adversarial model: 1- An adversary with a global view of all the nodes and their connections 2- An adversary that can eavesdrop on communication links between arbitrary pair of nodes (unless the adversary is one end of the communication). In specific, the communication channels are assumed to be secure.
|
||||
- Any node running the `WakuFilter` protocol i.e., both the subscriber node and the queried node are considered as an adversary. Furthermore, we consider the adversary as a passive entity that attempts to collect information from other nodes to conduct an attack but it does so without violating protocol definitions and instructions. For example, under the passive adversarial model, no malicious node intentionally hides the messages matching to one's subscribed content filter as it is against the description of the `WakuFilter` protocol.
|
||||
- The following are not considered as part of the adversarial model:
|
||||
- An adversary with a global view of all the nodes and their connections.
|
||||
- An adversary that can eavesdrop on communication links between arbitrary pairs of nodes (unless the adversary is one end of the communication). In specific, the communication channels are assumed to be secure.
|
||||
|
||||
|
||||
## Protobuf
|
||||
|
Loading…
x
Reference in New Issue
Block a user