Open dennis-tra opened 1 year ago
Also see rust-libp2p kademlia implementation
Adding https://iroh.computer/design/dsht/ which has some thinking on improvements that can be made
I like the idea of using Argon2id for identity generation for mitigating Sybil attacks. If we are to change the key generation process, we may also want to get a balanced trie. For the IPFS network, it would be a protocol change, so ideally we could group it with another protocol breaking change (such as Composable DHT).
To avoid falling for the "Not invented here" syndrome I want to use this issue as a dumping ground for take-aways from other DHT implementations and specifications. Some I want to look at
I'll update this top-level issue comment whenever I have found the time to look into any of the above.
Theseus
Interesting bit on traffic obfuscation:
Instead of a SHA256, they use Argon2id for Sybil resistance. They claim that Argon2id was "designed to render [brute-force attacks] extremely computationally expensive." This, together with peer ID expirations form the basis for Sybil resistance