On Fri, Dec 17, 2010 at 04:03:06PM +0100, Loic Dachary <l...@dachary.org> wrote a message of 100 lines which said:
> A user finds the answer to question Q by sending a request to the > DHT node responsible for Q (the question Q is hashed into a DHT > key). A malicious node may try to impersonate the node responsible > for Q and return an answer that is irrelevant. Why does it need to impersonate? It can simply join the DHT and then be authoritative for a subset of the keys and reply what it wants. That's the biggest problem with open DHTs (closed, one-shop DHT, like those used at Google, Skype or Facebook are a different matter). _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers