This commit is contained in:
decanus 2020-02-07 19:23:22 +01:00
parent 29a8743e54
commit a8ae883974
No known key found for this signature in database
GPG Key ID: E95B8C69228FF5B4
3 changed files with 1 additions and 3 deletions

View File

@ -43,7 +43,7 @@
<meta name="twitter:image" content="{{ site.url }}{{ site.baseurl }}{{ page.image }}"> <meta name="twitter:image" content="{{ site.url }}{{ site.baseurl }}{{ page.image }}">
{% else %} {% else %}
<meta name="twitter:card" content="summary"> <meta name="twitter:card" content="summary">
<meta name="twitter:image" content="{{ site.title_image }}"> <meta name="twitter:image" content="{{ site.url }}/assets/img/vac.png">
{% endif %} {% endif %}
<!-- end of Twitter cards --> <!-- end of Twitter cards -->

View File

@ -8,7 +8,6 @@ published: true
permalink: /vac-overview permalink: /vac-overview
categories: research categories: research
summary: Vac is a modular peer-to-peer messaging stack, with a focus on secure messaging. Overview of terms, stack and open problems. summary: Vac is a modular peer-to-peer messaging stack, with a focus on secure messaging. Overview of terms, stack and open problems.
image: /assets/img/vac.png
--- ---
Vac is a **modular peer-to-peer messaging stack, with a focus on secure messaging**. What does that mean? Let's unpack it a bit. Vac is a **modular peer-to-peer messaging stack, with a focus on secure messaging**. What does that mean? Let's unpack it a bit.

View File

@ -8,7 +8,6 @@ published: true
permalink: /dns-based-discovery permalink: /dns-based-discovery
categories: research categories: research
summary: A look at EIP-1459 and the benefits of DNS based discovery. summary: A look at EIP-1459 and the benefits of DNS based discovery.
image: /assets/img/vac.png
--- ---
Discovery in p2p networks is the process of how nodes find each other and specific resources they are looking for. Popular discovery protocols, such as [Kademlia](https://pdos.csail.mit.edu/~petar/papers/maymounkov-kademlia-lncs.pdf) which utilizes a [distributed hash table](https://en.wikipedia.org/wiki/Distributed_hash_table) or DHT, are highly inefficient for resource restricted devices. These methods use short connection windows, and it is quite battery intensive to keep establishing connections. Additionally, we cannot expect a mobile phone for example to synchronize an entire DHT using cellular data. Discovery in p2p networks is the process of how nodes find each other and specific resources they are looking for. Popular discovery protocols, such as [Kademlia](https://pdos.csail.mit.edu/~petar/papers/maymounkov-kademlia-lncs.pdf) which utilizes a [distributed hash table](https://en.wikipedia.org/wiki/Distributed_hash_table) or DHT, are highly inefficient for resource restricted devices. These methods use short connection windows, and it is quite battery intensive to keep establishing connections. Additionally, we cannot expect a mobile phone for example to synchronize an entire DHT using cellular data.