this post was submitted on 23 Nov 2024
455 points (96.3% liked)

Showerthoughts

29819 readers
1133 users here now

A "Showerthought" is a simple term used to describe the thoughts that pop into your head while you're doing everyday things like taking a shower, driving, or just daydreaming. A showerthought should offer a unique perspective on an ordinary part of life.

Rules

  1. All posts must be showerthoughts
  2. The entire showerthought must be in the title
  3. Avoid politics
    • 3.1) NEW RULE as of 5 Nov 2024, trying it out
    • 3.2) Political posts often end up being circle jerks (not offering unique perspective) or enflaming (too much work for mods).
    • 3.3) Try c/politicaldiscussion, volunteer as a mod here, or start your own community.
  4. Posts must be original/unique
  5. Adhere to Lemmy's Code of Conduct

founded 1 year ago
MODERATORS
 

Had this thought the other day and tbh it's horrifying to think about the implications of one, or God forbid all, of them going down.
Stackoverflow too but that only applies to nerds haha

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 3 points 1 day ago (6 children)

In theory this could be true. In practice, data would be ripe for poisoning. It's like the idea of turning every router into a last mile CDN with a 20TB hard drive.

Then you have to think about security and not letting the data change from what was originally given. Idk. I'm sure something is possible, but without a real 'omph' nothing big happens.

[–] possiblylinux127 3 points 1 day ago (3 children)

The data would be hashed so any changes would be thrown out.

[–] [email protected] 1 points 22 hours ago (2 children)

Hashed by whom? Who has the source of truth for the hashes? How would you prevent it from being poisoned? .. or are you saying a non-distributed (centralized) hash store?

If centralized: you have a similar problem to IA today. If not centralized: How would you prevent poisoning? If enough distributed nodes say different things, the truth can be lost.

[–] possiblylinux127 1 points 21 hours ago (1 children)

This is a topic that is pretty well tested. Basically the data is validated when received.

For instance in IPFS data is tracked by its hash. You request something by a CID which is just a hash.

There are other distributed networks and they all have there own ways of protecting against attacks. Usually an attack requires a huge amount of resources.

[–] [email protected] 1 points 19 hours ago

Even in ipfs, I don't understand discoverability. Sort of sounds like it still needs a centralized list of metadata to content I'd, etc.

load more comments (2 replies)