diff --git a/i2p2www/pages/site/docs/how/network-database.html b/i2p2www/pages/site/docs/how/network-database.html index 5645e58a..c9d87a93 100644 --- a/i2p2www/pages/site/docs/how/network-database.html +++ b/i2p2www/pages/site/docs/how/network-database.html @@ -674,7 +674,7 @@ routers that are only sometimes malicious may be much harder to deal with.
{% trans url='http://citeseer.ist.psu.edu/douceur02sybil.html' -%} +
{% trans url='https://www.freehaven.net/anonbib/cache/sybil.pdf' -%} An attacker may mount a Sybil attack by creating a large number of floodfill routers spread throughout the keyspace. {%- endtrans %}
@@ -721,7 +721,7 @@ This attack becomes more difficult as the network size grows.{% trans url='http://citeseer.ist.psu.edu/douceur02sybil.html' -%} +
{% trans url='https://www.freehaven.net/anonbib/cache/sybil.pdf' -%} An attacker may mount a Sybil attack by creating a small number (8-15) of floodfill routers clustered closely in the keyspace, and distribute the RouterInfos for these routers widely.