Replies: 4 comments 5 replies
-
|
Beta Was this translation helpful? Give feedback.
-
Comparison with existing web3 stack (of cryptocurrency)
What locutus can solve is, the continual distribution of frontend, state query (It's a DHT anyway), and content delivery (It caches content in accord with demand). For many applications, like Matrix, a voluntary, simple network like Locutus is probably enough. (It distributes the frontend with subsequent updates, and hosts the state of rooms). More accurately it solves the state replication, synchronization, storage problem, in a distributed, verified manner. Alternatives are
Matrix/Fediverse doesn't do state distribution well. It's not hard to find a critique on that. That issue is most critical to the 'final' performance, user experience of a decentralized social platform. Further, the reliance on centralized CDNs, centralization around a few powerful fediverse servers, are not 'healthy'. Considering Locutus is not a solution to all the problems, I expect apps to compose a stack that fulfills users' needs. Ex. using a light client from some blockchain to allow for more secure name registration. loading videos from IPFS. running Locutus over anonymity networks. Another example is that if a torrent fails, it's better to get it from a data market, like zkpod which is better than nothing. for most cases data isn't scarce. one can build such a market with UI and state hosted on Locutus. This is an illustration of a possible future landscape that I agree with. source I prefer to put dweb protocols into 4 categories, anonymity (i2p/nym), connectivity (cjdns/yggdrasil), state replication (ipfs/locutus/fediverse/torrent/many more), consensus (blockchain). For consensus the extreme is Mina that can offer no state but only a root state hash continually advanced. It also shows that most protocols are just state replication... |
Beta Was this translation helpful? Give feedback.
-
Good security engineering is forward thinking, It is about planing on failure. DDoS attacks are more common than ever, and they can be especially damaging for small dapps who lack infrastructure and an ops team. A central problem to Using Tor as a gateway on the modern network may introduce more problems than it solves. Tor's anonymity makes it impossible for rate-limiting DDoS attacks, and this is being actively exploited. It is very common for Tor hidden node gateways to be held for ransom, and the situation is continuing to degrade as we go into 2023: Basically any Tor node can be taken offline at a whim at this point. i2p's DHT on the other hand has a more fundamental flow-rate control for bundled messages which has been more resilient than Tor's opportunistic onion routing. The i2p's team ability to patch flood-fill routing while they are being attacked is truly admirable: In terms of operational engineering, the i2p DHT has got to be one of the most resilient out there. Fred did two things very well - it had a good answer to the censorship problem above, and to the pinning economics that come into play for IPFS. I really liked that the more times a freesite was requested, the more capacity was created to deliver that site - which I still think is elegant. I fully agree that forcing people to store unwanted data is undesirable, on the other hand IPFS has the ability to restrict files that your node serves. It allows for users to opt into a network of self-censorship, which is a form of consent that is working and their protocol has gained amazing levels of adoption in the dapp space. And yes there are IPFS nodes which disable censorship because it is just an optional switch. So why not allow people to choose who their censors are? I think that IPFS would be better off if nodes on the network where more friendly to each-other. Having an agreement where you are expected to cache everything you request - as to not burden the network should be apart of the spec. Additionally - having proxied relays and multiplexed relays that act as a cache for recently requested data. If someone is a gateway without pinning, then they are freeloading off of the network and burdening their neighbors with expensive requests when that could be solved with cheap local storage. A killer feature for web3 dapps would be to use IPFS's RPC calls but have a "deep pin" feature where these files are held onto for free, similarly to fred but unencrypted. Everyone wants free IPFS pins, and data storage is cheaper than ever. This would help spur adoption in a growing niche. Honestly the reason why I liked Freenet from the start was the idea that "Never again shall book burning rob from humanity." Well, if Locutus is on Kademlia already, can the node expose this service as an IPFS RPC by default? |
Beta Was this translation helpful? Give feedback.
-
In any case, the problem is getting worse.
https://www.zdnet.com/article/dark-web-crime-markets-targeted-by-recurring-ddos-attacks/
…On Sat, Jun 3, 2023, 5:30 PM plein ***@***.***> wrote:
Tor's anonymity makes it impossible for rate-limiting DDoS attacks
Not true. There is *Rate-limiting-nullifiers*.
—
Reply to this email directly, view it on GitHub
<#619 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAD7MN2YKXR2W7R5WQECIRDXJPJLNANCNFSM6AAAAAAXYFXTVU>
.
You are receiving this because you commented.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
Starting a discussion thread about contrasting Locutus with other systems like IPFS, Bluesky, Nostr, Mastodon, and Matrix. I'll later compile this into a document to go on the website.
Beta Was this translation helpful? Give feedback.
All reactions