On 2012-05-15 1:16 PM, Tom Ritter wrote:
But I may have reinvented something simple or missed an obvious flaw,
because I'm not well-versed in how DHT works, or anything published in
this area.

When last I looked, DHT assumed that everyone correctly follows the protocol and is equally prosocial, which struck me at the time as a very major flaw.

_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to