Follow

Chapter 4, in which we introduce malicious pinecones to model classes of attack on the P2P Matrix network (and figure out mitigations). Very fun to have got to the point of handling adversarial conditions!

@matrix wait, did you implement all that simulation in-house? looks quite impressive

Sign in to participate in the conversation
Matrix.org's Mastodon

mastodon.matrix.org is one server in the network