• qwerty@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    23
    arrow-down
    3
    ·
    3 days ago

    Tor relays only relay the traffic, they don’t store anything (other than HSDirs, but that’s miniscule). Session relays have to store all the messages, pictures, files until the user comes online and retrieves them. Obviously all that data would be too much to store on every single node, so instead it is spread across only 5-7 nodes at a time. If all of those nodes ware to go offline at the same time, messages would be lost, so there has to be some mechanism that discourages taking nodes offline without giving a notice period to the network. Without the staking mechanism, an attacker could spin up a bunch of nodes and then take them all down for relatively cheap, and leave users’ messages undelivered. It also incentivizes honest operators to ensure their node’s reliability and rewards them for it, which, even if you run your node purely for altruistic reasons, is always a nice bonus, so I don’t really see any downside to it, especially since the end user doesn’t need to interact with it at all.

    • Natanael@infosec.pub
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      3 days ago

      I2P already did that with their DHT network (remember DHT?). I2P Bote uses that for messaging

      • vacuumflower@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 days ago

        Eh, no. A DHT doesn’t solve offline storage of data, when the source node is already offline, and the target node is not yet online.

        • Natanael@infosec.pub
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 days ago

          It does temporarily, on the order of hours to days. It’s not designed to use the network for long term storage, just message passing

          • vacuumflower@lemmy.sdf.org
            link
            fedilink
            English
            arrow-up
            2
            ·
            2 days ago

            No, DHT is just a way of determining paths and priority of value lookup by key in the network, so that the load were distributed predictably, while allowing you to find, well, what you are looking for. BTW, while everybody uses Kademlia with modifications, I’d argue that Chord is better for anything related to security and anonymity.

            Storage and serving of anything big is another thing. I take it you mean that I2P nodes cache messages relayed via them when the target node is unavailable. That doesn’t have anything to do with DHT.

            • Natanael@infosec.pub
              link
              fedilink
              English
              arrow-up
              3
              ·
              2 days ago

              I2P has its own internal DHT network. Bote piggybacks on it to relay messages between Bote nodes. You can even configure it so you can address random online nodes and ask them to hold a message for another node to relay (online or offline) to obscure message timing

              DHT can be used for almost anything as a generic key value store, even if the typical use is just peer finding

              https://bote.readthedocs.io/en/latest/v5/kademlia/

                • Natanael@infosec.pub
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  edit-2
                  1 day ago

                  Correct, and slow is kinda the point (traffic metadata protection through timing obfuscation)

                  There’s even a setting to set multiple Bote hops (inside I2P which already use multiple hop tunnels) with random delay per node (up to 24h)

                  • vacuumflower@lemmy.sdf.org
                    link
                    fedilink
                    English
                    arrow-up
                    0
                    ·
                    20 hours ago

                    OK, I really love I2P, just wish sometimes there would be ways to use it with latency and throughput approaching clearnet. I like that it’s a platform solving the P2P and discovery problems for everyone in the same way and providing interfaces for that, but the privacy and security orientation means that it’s mostly used for privacy and security (even pedo filesharing doesn’t seem to be too many people).