I think I remember that either the answer is no, or that the way GNUnet uses its DHT ensures that it is not a problem.
I am asking to know whether it is an aspect we need to keep an eye on when designing new DHT apps, given the terrible experiences seen with the Tor, Retroshare and Bittorrent projects in that regard. I am aware that "naked" use of the DHT may still bring about sybil attack scenarios, but right now I am concerned about attackers being able to walk the DHT and systematically cause disturbances to our services. So to answer my question I consulted src/dht, documentation/gnunet-c-tutorial.texi and documentation/chapters/developer.texi in that order. The latter mentions that there are two papers I should look at, but neither of them are linked in the texi file. I would suggest to provide links directly out of the documentation. I tried https://gnunet.org/dht - but there is no such page. Then went for "Publications about GNUnet", but it makes no mention of "dht" over several pages. So here I am, asking the list! -- E-mail is public! Talk to me in private using encryption: http://loupsycedyglgamf.onion/LynX/ irc://loupsycedyglgamf.onion:67/lynX https://psyced.org:34443/LynX/ _______________________________________________ GNUnet-developers mailing list [email protected] https://lists.gnu.org/mailman/listinfo/gnunet-developers
