diff --git a/NewCaps/WhatCouldGoWrong.md b/NewCaps/WhatCouldGoWrong.md index bddb68e..f4127b1 100644 --- a/NewCaps/WhatCouldGoWrong.md +++ b/NewCaps/WhatCouldGoWrong.md @@ -6,7 +6,7 @@ This is about What Could Go Wrong with the "Elk Point 2" immutable file caps: *S*|brute force on *R* is !#2| |7|unauthorized deletion|brute force KD|anyone|any one file|secrecy of *KD*|2^*d*^| @@ -29,5 +29,7 @@ where *k* = bitlength(*K1*), *n* = bitlength(*R*), *s* = bitlength(*S*), *t* = b 5. Brute force costs assume a single-target attack that is expected to succeed with high probability. Costs will be lower for attacking multiple targets or for a lower success probability. (Should we give explicit formulae for this?) +6. *roadblock*/*speedbump* attacks could be restricted to holders of a read cap by use of an extra signature, as in the Elk Point 3 design (diagram at for mutable files). + \ No newline at end of file