DHT is not a silver bullet.

npub14w4qnk43lsllls2qnldj3vfcxtx5qvtsf3xlvxv9yha8afrxhmfqju3rwx
hex
f2ff4d1ad7549a036107eeb6209610afdf0e1bc89ed45beaa240c10a6d5884acnevent
nevent1qqs09l6drtt4fxsrvyr7ad3qjcg2lhcwr0yfa4zma23ypsg2d4vgftqprpmhxue69uhhyetvv9ujuem4d36kwatvw5hx6mm9qgs2h2sfm2clc0llc9qflkegkyur9n2qx9cycn0krxzjt7n753nta5shf87vpKind-1 (TextNote)
↳ Reply to Event not found
fb54085b011124692edac4088816f971f32e9504fe971288dc8678c50afcb252...
DHT is not a silver bullet.
Torrents get spam attacks, CJDNS routing tables have grown enough to require offloading the routing to dedicated nodes (this scaling problem inspired the creation of the Yggdrasil network, which our friend nostr:npub1y0gja7r4re0wyelmvdqa03qmjs62rwvcd8szzt4nf4t2hd43969qj000ly shares some similarities, namely the spanning tree routing algorithm), IPFS supposedly addresses the vulnerability issues but discoverability of “unpopular” content is slower than finding whatever most of the nodes are already hosting.
Bottom line is, resiliency is hard.
Raw JSON
{
"kind": 1,
"id": "f2ff4d1ad7549a036107eeb6209610afdf0e1bc89ed45beaa240c10a6d5884ac",
"pubkey": "abaa09dab1fc3fffc1409fdb28b13832cd4031704c4df6198525fa7ea466bed2",
"created_at": 1776717797,
"tags": [
[
"e",
"ace6846e172101ee88ee9ce48880539e77923bddb1ff7e0b0fc2376290a5ca98",
"",
"root"
],
[
"e",
"fb54085b011124692edac4088816f971f32e9504fe971288dc8678c50afcb252",
"",
"reply"
],
[
"p",
"7672c39dd8ac61f16a52f81578bfebdb5f8c70bc5a7277656ab5ba67bb590f58"
],
[
"p",
"930ccef12372dd2f16057cfc54f0dbd94335d8b51b4e2737236b00cab718fcd9"
],
[
"p",
"23d12ef8751e5ee267fb6341d7c41b9434a1b99869e0212eb34d56abb6b12e8a"
],
[
"client",
"Nostur",
"31990:9be0be0fc079548233231614e4e1efc9f28b0db398011efeecf05fe570e5dd33:1685868693432"
]
],
"content": "DHT is not a silver bullet. \n\nTorrents get spam attacks, CJDNS routing tables have grown enough to require offloading the routing to dedicated nodes (this scaling problem inspired the creation of the Yggdrasil network, which our friend nostr:npub1y0gja7r4re0wyelmvdqa03qmjs62rwvcd8szzt4nf4t2hd43969qj000ly shares some similarities, namely the spanning tree routing algorithm), IPFS supposedly addresses the vulnerability issues but discoverability of “unpopular” content is slower than finding whatever most of the nodes are already hosting.\n\nBottom line is, resiliency is hard. ",
"sig": "04675b1c251cb9875087ec25e9e8020f306b19575f7c5bfe5061b4922c5e2a6b0c8ade0a22c1fb979db7d19f2152e30c3e807e48e72d9e557477b012340914ad"
}