Non-confidential. NDA available upon request. No license granted. Results may vary.

Scope first

  • One scenario and agreed constraints
  • KPIs and baselines agreed upfront
  • Clear boundaries: public site is intentionally non-enabling

Threat model (evaluation oriented)

  • Eclipse style neighbor capture, targeted victim isolation
  • Routing table poisoning, gradual or burst injection of biased entries
  • Churn, mild to severe, including orchestrated churn
  • Sybil note: meaningful evaluation requires an explicit identity or admission control posture
  • No operational attack steps on the public site (evaluation only)
  • Details and variants available under NDA after scope alignment

What we measure (examples)

  • Giant component under churn
  • Eclipse susceptibility proxy
  • Recovery time after partition
  • Mixing or propagation proxy
  • Tail behavior under targeted removal

Track

  • Backbone failures: reduce worst-case impact posture
  • Tail behavior: p95 to p99.9 under comparable regimes
  • Operational safety: guard rails, budgets, rollback expectations

How it works

  • Scope alignment: scenario, constraints, KPIs, baselines
  • Time-boxed execution: stress suites and comparable regimes
  • Decision report: pass / conditional / no-go

Typical engagement model

  • Scope alignment
  • Reproducible run plan
  • Execution
  • Decision report

Non-enabling on the public site. Results may vary. No deployment instructions.

Deliverables

  • Scope sheet: assumptions and scenario definition
  • Results summary: distributions, limitations, variability posture
  • Optional NDA addendum after scope alignment (when warranted)

Decision report includes

  • Distributions
  • Worst-case seeds
  • Budget consumption
  • Limitations
  • Pass / conditional / no-go

Reproducibility (where applicable)

  • Controlled run steps and runbook posture
  • Configs and logging expectations
  • Comparable baselines

Sample redacted report

Clear boundaries

  • No enabling algorithmic disclosure on the public site
  • No production deployment on a public scope
  • Results may vary with constraints and operating conditions

Typical timeline

  • 48 hours, scope alignment
  • 5 business days, runs and analysis
  • 48 hours, report delivery

Request evaluation

High-level request. Non-confidential by default. NDA available upon request.