Skip to content
This repository has been archived by the owner on Feb 18, 2021. It is now read-only.

Latest commit

 

History

History
36 lines (20 loc) · 5.84 KB

faq.md

File metadata and controls

36 lines (20 loc) · 5.84 KB

Frequently Asked Questions

These are questions that come up often, to add new ones please file an issue.

## Protocol ## Distributed Hash Table
  • Is the DHT required? - No, it's very useful for most situations, but a switch can be given one or more seeds that act as the sole operater/coordinator for connecting to other hashnames. A DHT is required when there is no central authority that knows all of the relevant hashnames.

  • What resources does it need to use it? (Will it make my phone hot?) - Participating in the DHT does not require any additional storage or blockchain-style computation, and only a tiny amount of bandwidth (~2 packets per second per peer with a minimum 8 peers). Mobile devices are not required to participate at all in order to use telehash, but when possible any instance should in order to have the fastest connectivity possible and anyone running dedicated seeds helps the entire network be faster and more resilient.

  • Can I create a private DHT? - The DHT in telehash is designed to be a single unified one, but for special circumstances it is possible to create a completely separate/private one by using a fixed/managed set of seeds. Every seed must know the hashnames of the other seeds and never form a link with any outside of that list. Apps must then use only one or more of those hashnames in their seeds to bootstrap from.

  • How will it survive a DDOS? - There are two aspects that contribute to being DDOS resistant, one is that there is nothing in the protocol that amplifies, where any one packet can be turned into two or more, so sending telehash packets has no advantage over sending just random data. The other is that seeds are only used to bootstrap on first boot, every switch should save out a hints file after it starts so that it doesn't depend on a fixed list of seeds (that would be a DDOS target).

## Security