Skip to content

Commit 4eae795

Browse files
committed
Removes some fixed TODOs
1 parent 1ae6c8f commit 4eae795

File tree

3 files changed

+1
-7
lines changed

3 files changed

+1
-7
lines changed

DataAuthenticity.tex

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
of the event.
99
\item\label{SpatiallyRelated} Prove that the data is spatially related to the
1010
physical location of the event.
11-
\end{requirements} %TODO: A4 accurate/not fabricated?
11+
\end{requirements}
1212
\Cref{CreatedBeforeEnd,CreatedAfterStart} together bind the data to the time of
1313
the event whereas \cref{SpatiallyRelated} binds the data spatially to the
1414
event.

ProtestVerif.tex

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -98,8 +98,3 @@
9898
demonstration, where (some of) the other protesters act as witnesses, then the
9999
\acp{LP} can be used to compute the participation count with all the
100100
authenticity, verifiability and privacy requirements above.
101-
%TODO: reviewer: what about cellphones to count attendance
102-
% This is actually done in \cite{2016DemonstrationsInSeoul}, it requires some
103-
% assumptions --- but they use wifi signals instead of the mobile network.
104-
% In either case, we pointed out that one wants the phone in flight mode due to
105-
% surveillance.

sybil.tex

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,6 @@
2222
Fortunately, there are techniques that can mitigate the effects of the Sybil
2323
attack without forcing us to use such a centralized identity system.
2424
We will return to these where relevant in the text.
25-
%TODO make sure we do
2625

2726
%This is, however, less desirable in the scenario we consider here.
2827
%Fortunately, if we use techniques like \ac{MPC}, then we can overcome the

0 commit comments

Comments
 (0)