On 2012-05-15 1:16 PM, Tom Ritter wrote:
But I may have reinvented something simple or missed an obvious flaw, because I'm not well-versed in how DHT works, or anything published in this area.
When last I looked, DHT assumed that everyone correctly follows the protocol and is equally prosocial, which struck me at the time as a very major flaw.
_______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
