Jeff Garzik [ARCHIVE] on Nostr: 📅 Original date posted:2011-06-13 🗒️ Summary of this message: Using ...
📅 Original date posted:2011-06-13
🗒️ Summary of this message: Using BitTorrent trackers, even HTTP-based ones, could help scale Bitcoin and make it harder for attackers to compromise clients. However, discovering HTTP trackers presents challenges.
📝 Original message:On Mon, Jun 13, 2011 at 5:38 AM, Christian Decker
<decker.christian at gmail.com> wrote:
> BitTorrent trackers are used to handle several thousands of requests, so
> they would probably scale well enough. I'm not even talking about using the
> DHT trackers, but using old fashioned HTTP based trackers. The fact that
> each bitcoin client would contact the tracker would make it very hard for an
> attacker to get bootstrapping clients to exclusively connect to his
> compromised clients. I would say that using a tracker such as OpenBittorrent
> provides the same advantages as using an IRC channel.
And how does the client discover HTTP trackers? You're either
hardcoding -those- into the client, or adding an additional bootstrap
step to discover them. Either way, it has the same problems as other
current methods.
The history and experience of gnutella's web caches vs. UDP host
caches seems highly relevant here.
--
Jeff Garzik
exMULTI, Inc.
jgarzik at exmulti.com
Published at
2023-06-07 01:36:20Event JSON
{
"id": "fbbdbce5955eed51422ea8281f8b463972155a120d3f60e7e51b545e0631aed2",
"pubkey": "b25e10e25d470d9b215521b50da0dfe7a209bec7fedeb53860c3e180ffdc8c11",
"created_at": 1686101780,
"kind": 1,
"tags": [
[
"e",
"d4af95208a02346338d87b5f4cff7201ddbb16d7c929000819e611192dd8ceee",
"",
"root"
],
[
"e",
"9dba5c1764844f760c5ea6ea9cc83bebf2412bccb6247ccff6ceee36251ae075",
"",
"reply"
],
[
"p",
"72cd40332ec782dd0a7f63acb03e3b6fdafa6d91bd1b6125cd8b7117a1bb8057"
]
],
"content": "📅 Original date posted:2011-06-13\n🗒️ Summary of this message: Using BitTorrent trackers, even HTTP-based ones, could help scale Bitcoin and make it harder for attackers to compromise clients. However, discovering HTTP trackers presents challenges.\n📝 Original message:On Mon, Jun 13, 2011 at 5:38 AM, Christian Decker\n\u003cdecker.christian at gmail.com\u003e wrote:\n\u003e BitTorrent trackers are used to handle several thousands of requests, so\n\u003e they would probably scale well enough. I'm not even talking about using the\n\u003e DHT trackers, but using old fashioned HTTP based trackers. The fact that\n\u003e each bitcoin client would contact the tracker would make it very hard for an\n\u003e attacker to get bootstrapping clients to exclusively connect to his\n\u003e compromised clients. I would say that using a tracker such as OpenBittorrent\n\u003e provides the same advantages as using an IRC channel.\n\nAnd how does the client discover HTTP trackers? You're either\nhardcoding -those- into the client, or adding an additional bootstrap\nstep to discover them. Either way, it has the same problems as other\ncurrent methods.\n\nThe history and experience of gnutella's web caches vs. UDP host\ncaches seems highly relevant here.\n\n-- \nJeff Garzik\nexMULTI, Inc.\njgarzik at exmulti.com",
"sig": "97a40d61ec57582692c707abc8fd43db59922d59ee4eaf840da9f1e998b8b4414133068bb2decbccf1ef6acba414e686a095ee053507e734c36c67586e4cf6b6"
}