When privacy is not built in by default, it opens opportunities for participants in the network to passively gather data points of what is happening in the network. The type of information disclosed by the correlation of these data points and its severity depends on the context (i.e. network protocol).
What type of data and metadata can be gathered by passively listening to network traffic in different P2P networks?
What information (intelligence) can be gathered from there?
Is it possible to classify classes of problems/privacy vulnerabilities by comparing the different P2P networks?
How to feed this information back to building privacy preserving P2P networks?
When privacy is not built in by default, it opens opportunities for participants in the network to passively gather data points of what is happening in the network. The type of information disclosed by the correlation of these data points and its severity depends on the context (i.e. network protocol).
What type of data and metadata can be gathered by passively listening to network traffic in different P2P networks?
What information (intelligence) can be gathered from there?
Is it possible to classify classes of problems/privacy vulnerabilities by comparing the different P2P networks?
How to feed this information back to building privacy preserving P2P networks?