nostr:nprofile1qqswuyd9ml6qcxd92h6pleptfrcqucvvjy39vg4wx7mv9wm8kakyujgpypmhxue69uhkx6r0wf6hxtndd94k2erfd3nk2u3wvdhk6w35xs6z7qgwwaehxw309ahx7uewd3hkctcpypmhxue69uhkummnw3ezuetfde6kuer6wasku7nfvuh8xurpvdjj7a0nq40 are you familiar with DHTs and do you have any thoughts here? Otherwise it seems like it may become necessary to keep a list of all possible known relays and ask every one if they have a kind 10002 and kind 0 for a pubkey.

Reply to this note

Please Login to reply.

Discussion

Yes I think a DHT would be a good solution. I'd prefer an existing DHT implementation since they can be somewhat complex, and not a new DHT-like social graph. The key would be the person's pubkey (or even a hash of that to make it smaller and make it work with an existing DHT implementation).

I haven't done any work on this.

Cool. I've worked with DHTs before and some of the security issues like eclipse and sybil attacks might be mitigated with a topology that is based on a web-of-trust, rather than by pubkey hash. It may end up being worthwhile to research, for that reason. I would need to take another look at DHT implementations to see how they have mitigated those issues. From my understanding, because of those vulnerabilities, there is somewhat limited utility in a DHT.