Hi,

Ring uses a DHT to find peers, which is extremely interesting because it
avoids single point of failures and dependency on a server provider.

However, doesn't that bring up privacy issues?  As far as I understood,
every time a Ring client makes a call, an entry is written to the DHT.

So, would an attacker be able to trace which ID calls which ID, by simply
"listening" to the DHT?  What if the attacker controls a majority of DHT
nodes?

Thanks,
Baptiste

Attachment: pgpIxm8FStNot.pgp
Description: PGP signature

_______________________________________________
Ring mailing list
[email protected]
https://lists.savoirfairelinux.net/mailman/listinfo/ring

Reply via email to