• Natanael@infosec.pub
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    2 days ago

    I2P already did that with their DHT network (remember DHT?). I2P Bote uses that for messaging

    • vacuumflower@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 day ago

      Eh, no. A DHT doesn’t solve offline storage of data, when the source node is already offline, and the target node is not yet online.

      • Natanael@infosec.pub
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 day ago

        It does temporarily, on the order of hours to days. It’s not designed to use the network for long term storage, just message passing

        • vacuumflower@lemmy.sdf.org
          link
          fedilink
          English
          arrow-up
          2
          ·
          15 hours ago

          No, DHT is just a way of determining paths and priority of value lookup by key in the network, so that the load were distributed predictably, while allowing you to find, well, what you are looking for. BTW, while everybody uses Kademlia with modifications, I’d argue that Chord is better for anything related to security and anonymity.

          Storage and serving of anything big is another thing. I take it you mean that I2P nodes cache messages relayed via them when the target node is unavailable. That doesn’t have anything to do with DHT.

          • Natanael@infosec.pub
            link
            fedilink
            English
            arrow-up
            2
            ·
            13 hours ago

            I2P has its own internal DHT network. Bote piggybacks on it to relay messages between Bote nodes. You can even configure it so you can address random online nodes and ask them to hold a message for another node to relay (online or offline) to obscure message timing

            DHT can be used for almost anything as a generic key value store, even if the typical use is just peer finding

            https://bote.readthedocs.io/en/latest/v5/kademlia/

              • Natanael@infosec.pub
                link
                fedilink
                English
                arrow-up
                1
                ·
                edit-2
                5 hours ago

                Correct, and slow is kinda the point (traffic metadata protection through timing obfuscation)

                There’s even a setting to set multiple Bote hops (inside I2P which already use multiple hop tunnels) with random delay per node (up to 24h)