On Mon, Dec 7, 2015 at 11:09 PM, Jonathan Wilkes <[email protected]> wrote: > Say a well-funded attacker takes the Carnegie Mellon deanonymization attack and introduces Sybil slowly over several months. The graph would look like this... https://metrics.torproject.org/networksize.html?graph=networksize&start=2007-07-04&end=2015-12-08 > What then is the defense? Pray.