Closed raphael10-collab closed 2 years ago
Hi Hyperswarm people! I found this on-going javascript implementation of onion protocol: https://github.com/Ayms/node-Tor . Please, have a look at it. It would be awesome if Hyperswarm would incorporate and use it. Looking forward to your feedback
Moving this to the DHT issue for now where I replied.
In search for info about privacy preserving DHTs, I found these interesting papers:
https://www.gpestana.com/blog/in-pursuit-of-private-dhts/
https://raw.githubusercontent.com/gpestana/p2psec/master/papers/privacy_preserving_dht/privacy_preserving_dht.pdf
https://www.gpestana.com/papers/everyone-is-naked-rev.pdf
where privacy vulnerabilities within a DHT are described.
In the last paragraph of the second paper, few Privacy Enhancing Technologies (PETs) are outlined and suggested for DHTs. Namely:
Onion Routines
, and cryptographic tools:Multi-Party Computation
andZero Knowledge
primitives.What are the mechanisms and the tools deployed in Hyperswarm in order to enhance and preserve, as much as possible, privacy? Would it be feasibly to implement the
Onion Routines
within Hyperswarm?