Christian F. Brinkmann
Christian F. Brinkmann
How exactly is your p2p network anonymous when one participant is openly known? Well, regardless of that, if B has a publicly known ip address and can listen to a...
The actual voting mechanism and the required authorization is not relevant in this context. You intend to use TOR to create an anonymous p2p network, yet at the same time...
>Each vote is sent via torpy to each server I assumed "2P2" was you misspelling "P2P" and you were trying to build an anonymous P2P network, yet now you state...
>Yes, but you would have to attack everyones' servers. Likewise with DDOS: You would have to make a gigantic attack against most servers. That really depends on how many servers...
>I think it is fine that just everyone on earth could run their own server Well that would require advertising the new servers before voting is done, which would either...
I've looked into the matter a bit more and the amount of errors these days are even higher than i anticipated. You should most definitely plan on doing some extensive...