Hi, Ring uses a DHT to find peers, which is extremely interesting because it avoids single point of failures and dependency on a server provider.
However, doesn't that bring up privacy issues? As far as I understood, every time a Ring client makes a call, an entry is written to the DHT. So, would an attacker be able to trace which ID calls which ID, by simply "listening" to the DHT? What if the attacker controls a majority of DHT nodes? Thanks, Baptiste
pgpIxm8FStNot.pgp
Description: PGP signature
_______________________________________________ Ring mailing list [email protected] https://lists.savoirfairelinux.net/mailman/listinfo/ring
