-
In my opinion, the documentation (README) fails to succinctly explain what this distributed hash table is and what it is not. For instance, it does not explain how authentication and encryption is ach…
-
OK so since it's a tracker software it's a good place to list.
I started looking at: https://en.wikipedia.org/wiki/Comparison_of_BitTorrent_clients
But the list there is too much to grasp.
I know a…
elico updated
3 years ago
-
In BT task, when peer to peer handshake, if the other party opens the extended handshake, aria2 will send client = aria2 / version message to each other, no matter whether you have set up the user-age…
-
I don't like the torrents in a context of firewalled network : lot of connections not needed.
It can be famous to allow the user to disable this protocol without recompile all the code.
-
So there's quite a few of us now so perhaps we should code some stuff. I think implementing
https://wiki.theory.org/BitTorrentSpecification and then extending it with all the BEPs is the natural way…
-
such as:P2P,BitTorrent,torrent,ed2k,thunder
-
-
Hi, just finished the video and read through the paper. Lots of interesting stuff in there. Coincidentally, I've also been doing a lot of research in this area, and I've come across a few other projec…
-
Categories that can be added:
IOT
Verification
Stablecoin
Smart Contract
Mobile
Advertising
Network
Data Service
Crowdfunding
Gambling
Artificial Intelligence
Data Service
Trading
-
Current peer discovery mechanisms, including the DHT, trackers, and peer exchange, used in BitTorrent leave much to be desired.
This issue is a dump of notes regarding issues, and ways peer discove…
casey updated
4 years ago