“This proposal for a brand new P2P protocol model (v2) goals to enhance upon this by elevating the prices for performing these assaults considerably, primarily via the usage of unauthenticated, opportunistic transport encryption,” in accordance with the proposal. A key profit is that “encryption, even when it’s unauthenticated and solely used when each endpoints assist v2, impedes eavesdropping by forcing the attacker to change into energetic.”