That is factored in -- in fact that's the point of this calculation. The assumption being made here (for the sake of getting some hard numbers): 1410 sybil nodes, 1000 non-sybil nodes.
We only need one non-sybil node in the pooling chain to retain anonymity. The longer the chain, the greater the likelihood of this.
No you misunderstood my point. I mean the participants who are sending inputs to the CoinJoin mix. Those inputs can be Sybil attacked. If you are the only non-Sybil input, then your output is known with 100% certainty.
If there are 50% Sybil inputs, then the anonymity set of outputs that you are mixed with is reduced by 50%.
Ok, gotcha. That could be mitigated in a similar way by the community running scripts to act as inputs to push DS transactions through. I think Evan suggested this a while back.
Can you explain more? I don't understand.
Depends. Because 50% means that your anonymity set is reduced by 50% on each round as I explained in my other post above.
Example. If you are mixed with 10 others on each round, then only 5 will be anonymous (and one of the five might be you), so that means have 50% + 20% (1 in 5) chance to be non-anonymous. So 70% per round. You will need more rounds or you need larger mix sizes.
Also if it is same 10 you are mixed with every round (or any overlap), then anonymity is reduced. If always same 10 on every round, then you attain no better than 20% non-anonymous no matter how many rounds you use.
Also you have to factor in the non-anonymous rate of Tor and those inputs who didn't use Tor at all are not anonymous. This reduces your anonymity set, even if you use Tor.