On Tue, Jul 07, 2020 at 03:47:13PM +0000, таракан wrote:
> In a DHT 'everybody' can join... imagine therefore what a botnet of millions 
> of zombies machines and controlled by a single attacker could do...
> 
> BTW all these technologies - such as blockchain or DHT - are now being 
> quietly transferred into permissioned systems such as Corda etc ... 
> controlled directly by banks and Gvnt infrastructures and where the members 
> can be thoroughly controlled.


Thay are tools.  We can choose to not use such tools.

You can spin up your own DHT instance.  This is the nature of a tool.  Of 
course, a DHT is only relevant to "spin up" if you have a relevant number of 
users.

The nature of the DHT algorithms that I've briefly looked at suggest that they 
are specifically designed to scale - who joins is up to your app's design of 
course, but if you want "everyone" to join, then a DHT seems to me to be one of 
the few practical ways to have an end user computer cope with this choice 
(think exponential backoff, limited key/data replicas to say a max of 20 rather 
than everyone in the world having a copy of everything, etc).

You might find the following primer to be of interest - it's been useful to my 
understanding at least (and I have to read it again, and probably some simpler 
material - I'm not fully grokking this paper yet sorry):

   A Sybil-proof one-hop DHT
   https://pdos.csail.mit.edu/papers/sybil-dht-socialnets08.pdf
   https://pdos.lcs.mit.edu/papers/sybil-dht-socialnets08-slides.pptx
   https://dl.acm.org/doi/10.1145/1435497.1435501


BTW, if anyone can point me to the essential DHT reading to properly uderstand 
all the terms in the above paper, I would really appreciate that, I certainly 
struggled on a first pass, and not all terms in it are defined.


There is also info on detecting sybil nodes (I have not yet read the following, 
this is just a quick search):

   The Sybil Attacks and Defenses: A Survey
   
https://www.researchgate.net/publication/259440924_The_Sybil_Attacks_and_Defenses_A_Survey

   SybilInfer: Detecting Sybil Nodes using Social Networks | Semantic 
   
https://www.semanticscholar.org/paper/SybilInfer%3A-Detecting-Sybil-Nodes-using-Social-Danezis-Mittal/653fbfbad9d565dd5e5e0d48b6bb32dd02e8f157

   A Sybil-Proof Distributed Hash Table - PPTX
   https://vdocuments.site/a-sybil-proof-distributed-hash-table.html


BTW, perhaps you're already familiar with it, but your use case appears to 
relate well to TFC, Tin Foil Chat, which is appears to be a relatively simple 
system, using 3 computers, to guarantee NO possibl exfiltration of your private 
keys:

   https://github.com/maqp/tfc


which would seem to be a perfect fit for a Novena style setup:

   https://www.crowdsupply.com/sutajio-kosagi/novena


Create our world,

Reply via email to