TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

R5N - Obfuscated mesh routing on hostile networks.

106 pointsby tinydev10 months ago

3 comments

jay-barronville9 months ago
Is there an official reference implementation of the protocol available?
评论 #41186082 未加载
schanzen9 months ago
Presentation given at IETF 118: <a href="https:&#x2F;&#x2F;datatracker.ietf.org&#x2F;meeting&#x2F;118&#x2F;materials&#x2F;slides-118-dispatch-the-r5n-distributed-hash-table-00.pdf" rel="nofollow">https:&#x2F;&#x2F;datatracker.ietf.org&#x2F;meeting&#x2F;118&#x2F;materials&#x2F;slides-11...</a>
orthecreedence9 months ago
I&#x27;m curious about two things. I don&#x27;t really understand how the randomized addressing helps with data locality. Is it just saying that XOR gives random results, and so adding random hops before doing lookups gives a higher statistical percentage of reaching nodes?<p>Also how does this compare to something like libp2p w&#x2F; DCUtR for NAT traversal? Is the NAT problem circumvented by the randomized walk routing?
评论 #41184515 未加载