I2P already did that with their DHT network (remember DHT?). I2P Bote uses that for messaging
Comment on ‘There isn’t really another choice:’ Signal chief explains why the encrypted messenger relies on AWS
qwerty@discuss.tchncs.de 3 weeks agoTor relays only relay the traffic, they don’t store anything (other than HSDirs, but that’s miniscule). Session relays have to store all the messages, pictures, files until the user comes online and retrieves them. Obviously all that data would be too much to store on every single node, so instead it is spread across only 5-7 nodes at a time. If all of those nodes ware to go offline at the same time, messages would be lost, so there has to be some mechanism that discourages taking nodes offline without giving a notice period to the network. Without the staking mechanism, an attacker could spin up a bunch of nodes and then take them all down for relatively cheap, and leave users’ messages undelivered. It also incentivizes honest operators to ensure their node’s reliability and rewards them for it, which, even if you run your node purely for altruistic reasons, is always a nice bonus, so I don’t really see any downside to it, especially since the end user doesn’t need to interact with it at all.
Natanael@infosec.pub 3 weeks ago
vacuumflower@lemmy.sdf.org 2 weeks ago
Eh, no. A DHT doesn’t solve offline storage of data, when the source node is already offline, and the target node is not yet online.
Natanael@infosec.pub 2 weeks ago
It does temporarily, on the order of hours to days. It’s not designed to use the network for long term storage, just message passing
vacuumflower@lemmy.sdf.org 2 weeks ago
No, DHT is just a way of determining paths and priority of value lookup by key in the network, so that the load were distributed predictably, while allowing you to find, well, what you are looking for. BTW, while everybody uses Kademlia with modifications, I’d argue that Chord is better for anything related to security and anonymity.
Storage and serving of anything big is another thing. I take it you mean that I2P nodes cache messages relayed via them when the target node is unavailable. That doesn’t have anything to do with DHT.
tengkuizdihar@programming.dev 3 weeks ago
yet they couldve done this with volunteer nodes or even their own, because not even the server knows the content, right?
hanke@feddit.nu 3 weeks ago
Where does the reward come from?
Who pays the node maintainers for keeping stable nodes online?
qwerty@discuss.tchncs.de 3 weeks ago
Inflation, those are new tokens generated by the network, the same way new bitcoin is generated by the miners roughly every 10 minutes, just without the proof of work mining part. It’s called proof of stake, ethereum uses it as well.
hanke@feddit.nu 3 weeks ago
Okay, does this use a common crypto currency, or how do the node owners “profit” from upholding the service?
If it has its own cryptocurrency, where can they spend it?
qwerty@discuss.tchncs.de 3 weeks ago
It uses it’s own crypto. It’s not really a crypto -currency- in the sense that it’s meant to be used for payment or to store value. It’s more of a crypto -token- that’s meant to provide some limited utility in it’s ecosystem. Like an arcade token in an arcade, you can use it to play the games but that’s about it. Likewise the session token can be used to get some extra functionality within the network, like registering custom names on it’s dns like service that can be used to add new contacts instead of the long default user hash or as a stake if you want to run a node. The functionality is fairly limited right now but the devs plan to expand it soon. People also sometimes use these kind of tokens as a stock of sorts, so if the service/network becomes popular the value of it’s “stock” can grow so it can be used as an investment (personally I wouldn’t recommend that but whatever floats your boat [not a financial advice btw]). The node operators profit from selling these tokens to whomever wants to buy them.