Technological Disruption of P2P
•
Distribute spoofed files
–
Easy, but users/designers have countermeasures
•
Targeted denial-of-service attacks
–
Might work, but legally iffy
•
Disrupt self-organization algorithms
–
Legally iffy
•
Infiltrate with misbehaving nodes
–
Legally iffy