[Cryptography] Implementations, attacks on DHTs, Mix Nets?
Christian Huitema
huitema at huitema.net
Wed Aug 28 01:02:23 EDT 2013
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
> The DHT model says that millions of Raspberry Pi's and thumb drives together implement
> this immense database. But since a DHT, by design, scatters the data around the network
> at random, *my* thumb drive is full of information that I will never need - all the
> information *I* need is out there, somewhere - where, based on the research we've been
> discussing, I have no secure way to get at it. Why would I buy into such a design? Doesn't
> it make much more sense for me to store the information relevant to me?
When we designed PNRP, I was pretty adamant to avoid this business of storing other people's data. We assumed that your data would be stored locally. The cost is a bit of added synchronization cost, effectively scaling as the number of records that have to be published. But if you are looking at a P2P name server type application, there are very few such records.
Basically, the less nodes rely on strangers, the better.
- -- Christian Huitema
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.20 (MingW32)
Comment: Using gpg4o v3.1.107.3564 - http://www.gpg4o.de/
Charset: utf-8
iQEcBAEBAgAGBQJSHYReAAoJELba05IUOHVQuJsH/2W+6CLtc+IRjH/7ufNhlIx8
F8H30+vt3D1QxikluwKkzBB3HVxSiZL1N1z5z63Vvi9a+nIzuJPX8xNJf27tvvp7
gcHQqTz3J/Ffa2pX0fjtr83bpfBg+x27b7T4gBdbuN1KZ3sesQaHXWurCV2bz3Nb
9IDn2PYBOna+FXM/fMA8cpvElb+C6rEDvO0hcW1CVIxutt3yLICR3rAnyzhFQSUP
7MbnOZ7iSXRrmgvY3ukmI+OsAf9iOEavxdmgMYJJj1istyg1PMHcFH3MPoxggrfl
9ESTc1wiiZYsVF3r0SXf0DI08J8z7RXzJ/0WY9PUGgxQ49CEYgsq9ZSpUUfEm7Y=
=4LGc
-----END PGP SIGNATURE-----
More information about the cryptography
mailing list