• @[email protected]
    link
    fedilink
    010 months ago

    DHT returns an ip based on a hash, what do you mean.

    If you solely rely on DHT for searching for new things to download, than yes, that’s a good way to get unwanted material on your hard disk, I don’t recommend to do that to anybody at the curtent state of the technology. Don’t mix up things deliberately, usually people don’t do that, they get a torrent file or magnet link from a trusted source, than DHT can’t mess it up.

    • @[email protected]
      link
      fedilink
      3
      edit-2
      10 months ago

      Participating in the DHT allows others to find torrents and peers, without filtering, beause your machine is sharing information from your DHT peers.

      Interesting where you try to draw the line

      • @[email protected]
        link
        fedilink
        110 months ago

        As I understand DHT is just addresses and hashes, not the actual data.

        I draw the line this way: If I disconnect the computer from the network any given time, does it store the questionable data.

        • @[email protected]
          link
          fedilink
          2
          edit-2
          10 months ago

          Would running an onion relay that helps people access illegal material be fine? Nothing gets stored on your machine

          • @[email protected]
            link
            fedilink
            210 months ago

            Yes?

            Do you want to ban the internet because people using it for bad things? Basically you say the same thing.

            I don’t care what other people do, I care what they could do with me.

            • @[email protected]
              link
              fedilink
              110 months ago

              I never suggested such a thing, was just curious on your viewpoint.

              The way I see it, as any platform or service gets more users, traffic and messages the probability that it will be used for nefarious purposes approaches 100%. It’s the nature of life, it’ll happen anywhere and everywhere people can communicate or interact. It’s counter productive to ban technology like encryption or decentralised services just because someone might use it in a way the government doesn’t like, or for other nefarious purposes.