-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 13/02/15 16:33, Nathan of Guardian wrote:
>> In both cases, the Bluetooth MAC address is published in a DNS
>> TXT record via Wi-Fi Direct service discovery. Reverse
>> engineering the rest of the FireChat protocol is left as an
>> exercise for the reader. ;-)
> 
> I had a change to speak with the Rangzen team recently 
> (denovogroup.org/main/rangzen-project/) and they are doing the
> exact same thing.

Cool! Maybe we should put together some docs on how to do this.

> Would it make sense to publish more than the Bluetooth MAC in
> there? What about public keys, onions or other decentralized
> identity and routing information?

I think it depends on the use case. If you want to reconnect to the
same peers via Tor when they're no longer in range, maybe it makes
sense to publish an onion address here. If you want to build a trust
system where you prefer to connect to recognised/reputable peers,
maybe it makes sense to publish identity information here. But my
instinct is KISS - publish only the information needed for making a
connection, then handle all the other stuff after you connect.

Cheers,
Michael
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBCAAGBQJU3lKBAAoJEBEET9GfxSfMpoAH/2m03Ba8VLDuf4dgZkHTHUgN
a6Us0Xam6vir4aDXtBXkdR4hWlXqIQASzTyu88u+mZXRoyB3L9O1QTNdKPItoVry
wPWxA1y1G7qx1p2qOzkI9mNOI+lG/q3KtgecR+ahnXBbQI4zmICsMzSsAHZUVRaP
CnnMUht15uNQxXfMY8HX0Y3Fdr9BKlbp5aTfUFBnTdUnHS/CRcbsuSXRHEArYrfE
qyvUeWLHu6MJyd6Br6ySy4qzdMpwU71bVx8BjOi2BR9AGv1o9PrgOQi9Lws2geMI
nGppQeDd+SGdfv2HZkY3cotW4NKb3eRW2nURySDysQcWrb4ivim+3Dp8dSRf1Ms=
=G0VA
-----END PGP SIGNATURE-----
_______________________________________________
List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev
To unsubscribe, email:  guardian-dev-unsubscr...@lists.mayfirst.org

Reply via email to