Damus
tigs · 4w
Just wondering if you covered any of this? https://gist.github.com/ttiiggss/e8a1bc5dc326e66b202ae08955bfeb19 Ty!
tigs profile picture
This in particular...

For a public, permissionless mesh (anyone can join) — not yet. The four critical/high items (root hijacking, ancestry spoofing, bloom poisoning, discovery flooding) all assume a malicious node inside the mesh. In a permissionless network, that's guaranteed. The protocol needs:

Root election with cost — proof-of-work, minimum age, or stake
Per-entry ancestry signatures — already on their roadmap
Bloom filter validation — reject suspiciously dense filters
Per-source LookupRequest rate limiting — cap flood generation
2
ethfi · 4w
Exactly
Alex Xie · 3w
Maybe nostr:nprofile1qqszhwkw25l0a06cm42ezgtflykpzgltvysa0wsf9ak9qyz2lsc6emcpz3mhxue69uhhyetvv9ujuerpd46hxtnfduq3vamnwvaz7tmjv4kxz7fwwpexjmtpdshxuet5v4rnwd or nostr:nprofile1qqsthdwa5rs42euhnuz5xsrmmssr84hshwes7uj392vpeldj7z0zw3cpz9mhxue69uhkummnw3ezuamfdejj7qgwwaehxw309ahx7uewd3hkctcuvaf2f or nost...