On Tue, Jul 07, 2020 at 03:47:13PM +, таракан wrote:
> In a DHT 'everybody' can join... imagine therefore what a botnet of millions
> of zombies machines and controlled by a single attacker could do...
>
> BTW all these technologies - such as blockchain or DHT - are now being
> quietly transferred into permissioned systems such as Corda etc ...
> controlled directly by banks and Gvnt infrastructures and where the members
> can be thoroughly controlled.
Thay are tools. We can choose to not use such tools.
You can spin up your own DHT instance. This is the nature of a tool. Of
course, a DHT is only relevant to "spin up" if you have a relevant number of
users.
The nature of the DHT algorithms that I've briefly looked at suggest that they
are specifically designed to scale - who joins is up to your app's design of
course, but if you want "everyone" to join, then a DHT seems to me to be one of
the few practical ways to have an end user computer cope with this choice
(think exponential backoff, limited key/data replicas to say a max of 20 rather
than everyone in the world having a copy of everything, etc).
You might find the following primer to be of interest - it's been useful to my
understanding at least (and I have to read it again, and probably some simpler
material - I'm not fully grokking this paper yet sorry):
A Sybil-proof one-hop DHT
https://pdos.csail.mit.edu/papers/sybil-dht-socialnets08.pdf
https://pdos.lcs.mit.edu/papers/sybil-dht-socialnets08-slides.pptx
https://dl.acm.org/doi/10.1145/1435497.1435501
BTW, if anyone can point me to the essential DHT reading to properly uderstand
all the terms in the above paper, I would really appreciate that, I certainly
struggled on a first pass, and not all terms in it are defined.
There is also info on detecting sybil nodes (I have not yet read the following,
this is just a quick search):
The Sybil Attacks and Defenses: A Survey
https://www.researchgate.net/publication/259440924_The_Sybil_Attacks_and_Defenses_A_Survey
SybilInfer: Detecting Sybil Nodes using Social Networks | Semantic
https://www.semanticscholar.org/paper/SybilInfer%3A-Detecting-Sybil-Nodes-using-Social-Danezis-Mittal/653fbfbad9d565dd5e5e0d48b6bb32dd02e8f157
A Sybil-Proof Distributed Hash Table - PPTX
https://vdocuments.site/a-sybil-proof-distributed-hash-table.html
BTW, perhaps you're already familiar with it, but your use case appears to
relate well to TFC, Tin Foil Chat, which is appears to be a relatively simple
system, using 3 computers, to guarantee NO possibl exfiltration of your private
keys:
https://github.com/maqp/tfc
which would seem to be a perfect fit for a Novena style setup:
https://www.crowdsupply.com/sutajio-kosagi/novena
Create our world,