TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Spork: Peer-to-peer socket magic in the air

156 pointsby pcr910303over 3 years ago

12 comments

MayeulCover 3 years ago
See also: yggdrasil&#x2F;cjdns&#x2F;hyperbora that also provide p2p routing in a mesh network (without DHT), but also map public keys to an unused chunk of IPv6.<p>IPFS p2p is more similar to that project, with a DHT, though I am not sure about encryption.<p>To me, this is the future. I wish we had a set of APIs to allow connecting to a public key instead of an IP adress... however that requires reinventing most of the network stack (subnets, etc). That could be a base for IPv7. As a bonus, this could run on top of IPv4 or IPv6.<p>Creating ephemeral, E2EE addresses has a lot of nice properties: you can roam with the same address (making it easy to move a server around, even behind cellular internet). Browsers could use a different key for each site. Sites could use that as a session identifier to authenticate against.
评论 #28917432 未加载
评论 #28917076 未加载
评论 #28918209 未加载
评论 #28917934 未加载
评论 #28920842 未加载
评论 #28940856 未加载
评论 #28917750 未加载
pfrazeover 3 years ago
Hey all, I’m the author of spork. Just want to give credit to the Hypercore Protocol team as they’re responsible for 99% of this tool. They’re going to be speaking at NodeConf on Wednesday so check that out if you’re interested [1]<p>1. <a href="https:&#x2F;&#x2F;www.nodeconfremote.com&#x2F;#workshops&#x2F;how-to-build-p2p-applications-for-fun-and-profit" rel="nofollow">https:&#x2F;&#x2F;www.nodeconfremote.com&#x2F;#workshops&#x2F;how-to-build-p2p-a...</a>
评论 #28918191 未加载
评论 #28921090 未加载
KennyBlankenover 3 years ago
&gt; Spork is all about creating forward and reverse proxies between traditional sockets and p2p sockets.<p>&gt; Sockets are identified by a public key and connect using a Distributed Hash Table (DHT). Connections are end-to-end encrypted using the NOISE framework.<p>Okay, sounds like pretty neat. Is anyone aware of whether Spork is undergoing any sort of formal review?<p>NOISE appears to be popular and well-reviewed, but Spork uses noise-peer, a two-contributor project. Spork itself is one-contributor.<p>So...neat sounding, but I&#x27;m not using it for anything remotely sensitive until it sees more eyeballs. Hopefully a bunch of HNers can help with that.
评论 #28916933 未加载
ianopolousover 3 years ago
This is similar to p2p streams in IPFS. We&#x27;ve been using these in Peergos for 3 years now via the p2p http proxy in IPFS (which we contributed). It is a glorious model. The client, in our case Peergos, sends normal http requests to a localhost proxy URL that includes the target public key and voila! We wrote it up after developing it here: <a href="https:&#x2F;&#x2F;peergos.org&#x2F;posts&#x2F;dev-update" rel="nofollow">https:&#x2F;&#x2F;peergos.org&#x2F;posts&#x2F;dev-update</a><p>The underlying streams use TLS 1.3 as the transport encryption.<p>And we&#x27;ve just written a super minimal ipfs replacement (for ourselves) which includes this: <a href="https:&#x2F;&#x2F;github.com&#x2F;peergos&#x2F;ipfs-nucleus&#x2F;" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;peergos&#x2F;ipfs-nucleus&#x2F;</a>
apiover 3 years ago
One question that always comes up for me with DHT backed systems is resistance to DOS attacks. Making any P2P system resistant to DOS&#x2F;DDOS is brutally difficult, but DHTs have always seemed especially vulnerable to a sophisticated attacker. A hybrid sybil&#x2F;DDOS attack seems like it could down the network easily.<p>The Internet is a dark forest. Anything that gets popular will be attacked. The fact that it does not have a single owner may reduce the chances of ransom as a motive, but it doesn&#x27;t reduce the chances of all attacker profiles including just &quot;griefing.&quot;
notumover 3 years ago
Looks cool and simple to use, now can someone please explain to me why this matters?<p>What centralized system does Spork remedy? It bypasses DNS? Is there any sort of discovery and&#x2F;or replication and&#x2F;or redundancy?
评论 #28917852 未加载
red0pointover 3 years ago
This is very cool, but it seems extraordinarily cumbersome to pass on the generated super long string to another computer or mobile device.
评论 #28916760 未加载
评论 #28917187 未加载
marcodiegoover 3 years ago
This is good but, in terms of requiring special software on both sides, it is no better than tor which allows you to expose a service even behind NAT.<p>Anyone knows a similar service which do not needs special software on the client side?
评论 #28922270 未加载
supermattover 3 years ago
Any comments on hyperswarm vs libp2p (ipfs)? Why would I choose one over the other.
评论 #28917624 未加载
Tepixover 3 years ago
So is there a tool that makes it easy to look up the IP address(es) behind a public key? If not it should be trivial to code it, right?
rytillover 3 years ago
Are there configurable reliability settings, or is it TCP-only?
exporectomyover 3 years ago
I&#x27;m confused how the client&#x2F;local proxy finds the rest of the distributed hash table to do its lookup in. Are there some fixed conventional internet addresses it can start from or something?
评论 #28927047 未加载