On 08/02/2013 21:32, Dave Cridland wrote:

Well there's also a harvesting problem to solve, I think. You need to make it generally hard for a spammer to try all email addresses they have to convert that list into a list of jids.

Obviously a bad server holding a copy of the table is the worst case here.

Maybe the info could somehow be hashed (with e.g. bcrypt), so that it would not pose a problem for the client querying the information, but make it significantly harder for a “bad” server to get a hold of the (quite sensible) information.

This would also answer most privacy-related questions (even if a server is not “bad”, keeping private data in a DHT has privacy issues).


--
Mathieu Pasquet

Reply via email to