Gonçalo Pestana
Gonçalo Pestana
hey, nice work with ln and this module! at hashmatter we're planning to implement the sphinx-onion and hornet message formats and protocols for general purpose, to be used as a...
From dependabot: > The package github.com/valyala/fasthttp before 1.34.0 is vulnerable to Directory Traversal via the ServeFile function, due to improper sanitization. It is possible to be exploited by using a...
I'd like to exclude old `.sql` files from the linter check to integrate it in our pipeline. The reason being that I want to fail the build if squawk complains,...
SURB (single-use-reply-block) allows the last relay to send the response back to the initiator, while respecting the privacy and security properties of onion routing. Using SURBs must be optional. -...
It would be very helpful to start understanding what are the privacy requirements and current vulnerabilities of current projects using IPFS, Dat and other P2P networks. This study could be...
Lay out the specs and interfaces for `p3lib-octopusdht`. It should be easy to implement and use with libp2p and ipfs. `p3lib-octopusdht` is a protocol based on the paper "Secure and...
The OctopusDHT lookup assumes that active adversaries are detected and removed from the network by turning nodes into "shadow nodes" that use anonymous full routing table requests to verify if...
As a developer, in libp2p, I'd like to have more control over how much information the lookup protocol leaks and how the lookup peer 'candidate list' is populated. Instead of...
Keeping all non-code related tasks for p3lib-sphinx v0.1: - [x] Minimum protocol specs in place; - [x] Interfaces and API documented; - [x] Code examples; - [ ] Video with...