Security
Attacks
Poisoning attacks
Polluting attacks
Freeloaders
Insertion of viruses to carried data
Malware in the peer-to-peer network software itself
Denial of service attacks
Filtering
Identity attacks
Spamming
Countermeasures
Anonymity
Encryption
Last updated