Maybe it’s too early in the morning, anyone got a link, I couldn’t find any?
Maybe it’s too early in the morning, anyone got a link, I couldn’t find any?
I read it around 1990 and it was an ok thriller, with a somewhat unique play (world war and all) or so I felt back then. Doesn’t really remember anything noteworthy except the russkies would have won if they hadn’t been like unlucky IIRC (some spy stepping out in the street in front of a car, having like the attack plans or something). The people were totally forgettable.
So yeah, a nice read back then but that’s about it.
I thought ml was leaking
Interesting thing that Chord stuff.
Sounds like a good little tool to have there, it’s always hell to share stuff among computers and phones and stuff! Guess overwriting from one side to the other (and vice versa) would be hell to fix in a user friendly manner though… If you don’t go for a master/slave system, or git repo style…
Thank you!
Ya, there was a saying in video game dev circles, when you have finished 90% of a game, that’s good, because now you only have the other 90% to do…
What was that project, if you’d like to share?
Thanks!
The file does have an ownership information (the public RSA key of the owner), it’s just that a malicious node doesn’t show any proof of ownership of the data it’s sending (which causes the problem). I think I have a straight forward solution but I’ll ponder it a bit more before digging in :-) I’d like to have the possibility to download from several nodes at once which makes things a bit more interesting.
Would you mind if I copy paste this conversation over to tenfingers@lemmy.mindoki.com ? I guess here it will disappear in the abyss…
Cheers
Valmond
The idea is that nodes are trust-less, they do not know anything about the data.
An owner is authentified over an RSA handshake, so if the owner is not compromised, your request for updating a data will be rejected.
A malicous node though, must be both lucky (asked to share the data, so it can try to serve the malicious data) but also must have access to the link file so he can use the AES key to encrypt the bad data. This could happen if a malicious peron gets the hand on the link file, which sort of defeats the whole idea in the first place but it’s an attack vector for sure.
So back to the drawing board again.
The public RSA key of the owner is already in the link file, I think I can use it to authenticate the data (say the original user uses his private RSA to sign a hash of the data and adds it to the payload).
Very good feedback, I thought I had it all covered. It seems like I can make a secure fix but I’ll think a bit more about it first of course.
Thanks, good ideas and recommendations!
The data is overshared, so several nodes store your data (as you store theirs. The storage requirements are roughly your data size times the number of over shares. The number of overshares is confugurable on a per data basis), this makes the availability high.
The data is encrypted with AES 256 (CTR) so nodes do not know what they are storing.
It’s hard to invent new logos I guess, at least mine is blue and laying on the side…
It might feel like IPFS but the underlying tech is completely different, so it’s not a DHT but uses dynamic links, which means that you can update your shared data without the need to re distribute the link file.
Ha ha point taken, I’ll convert it to a better format.
Set up wifi plus some free music streaming (not saying you should purate it, or use a web browser with ad block), hook it up to a loudspeaker and tada, modern jukebox!
No, or very few, locks in too. Like overclock or have virtualization.
Because I had lots of problems with my lemmy.mindoki.com server, so I shamefully uses an accunt on lemmy.world.
Just wiped the server a coupla of days ago (snif), so if everything works out well this time you’ll see valmond from mindoki the next time :-)
They want to be him. Like they are dreaming they are Trump?
Or I can’t really imagine why they’d do it.
A lemmy server, and my experimental Tenfingers sharing protocol nodes.
Well, modern c++ with smartpointers is quite good IMO.
C on the ither hand is like swimming with sharks, with a nosebleed.
OpenSusan
Trump only raptures you if you’re under 14
APM (Atomically Precise Manufacturing)
Finally a correct answer!
Back in the day game logic was calculated each rebder-frame, because the hardware was too weak (say, C64).
Not tying the framerate to the logic “frames” makes for smoother user experience when the world gets hard to draw and your screen framerate goes down but your logic “frames” are still ticking on at the same speed.
Locking those two together today has no meaning with the possible exception of small simple cpu hand healds (say the Nintendo DS for example).
Extreme longevity (healthy longevity ofc).
There are so many things and people and places to discover.
Sounds like a fake humblebrag.