Comment on ‘There isn’t really another choice:’ Signal chief explains why the encrypted messenger relies on AWS
Natanael@infosec.pub 1 day agoI2P already did that with their DHT network (remember DHT?). I2P Bote uses that for messaging
Comment on ‘There isn’t really another choice:’ Signal chief explains why the encrypted messenger relies on AWS
Natanael@infosec.pub 1 day agoI2P already did that with their DHT network (remember DHT?). I2P Bote uses that for messaging
vacuumflower@lemmy.sdf.org 1 day ago
Eh, no. A DHT doesn’t solve offline storage of data, when the source node is already offline, and the target node is not yet online.
Natanael@infosec.pub 1 day ago
It does temporarily, on the order of hours to days. It’s not designed to use the network for long term storage, just message passing
vacuumflower@lemmy.sdf.org 21 hours ago
No, DHT is just a way of determining paths and priority of value lookup by key in the network, so that the load were distributed predictably, while allowing you to find, well, what you are looking for. BTW, while everybody uses Kademlia with modifications, I’d argue that Chord is better for anything related to security and anonymity.
Storage and serving of anything big is another thing. I take it you mean that I2P nodes cache messages relayed via them when the target node is unavailable. That doesn’t have anything to do with DHT.
Natanael@infosec.pub 18 hours ago
I2P has its own internal DHT network. Bote piggybacks on it to relay messages between Bote nodes. You can even configure it so you can address random online nodes and ask them to hold a message for another node to relay (online or offline) to obscure message timing
DHT can be used for almost anything as a generic key value store, even if the typical use is just peer finding
bote.readthedocs.io/en/latest/v5/kademlia/