Technological Disruption of P2P
•Distribute spoofed files
–Easy, but users/designers have countermeasures
•Targeted denial-of-service attacks
–Might work, but legally iffy
•Disrupt self-organization algorithms
–Legally iffy
•Infiltrate with misbehaving nodes
–Legally iffy