-
Notifications
You must be signed in to change notification settings - Fork 229
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Query hash of CIDs to protect content privacy #706
Comments
I do not think its good idea to implement CPU intensive stuff now. Large IPFS nodes have already pretty high CPU demands which limits their scalability. IPFS use case is to serve as public data storage, there is no need to put anonymizing stuff in. |
I guess a compromise would be to make that opt-in, with node advertizing at protocol-negociation time if they support hashed CID serving? |
Response do not need to be encrypted. Node asking DHT will need real CID to download content. |
Tracked in ipfs/specs#373 |
Currently, queries are made to find providers for a cid directly. This means any participant in the DHT may learn about the request for the content, and it is trivial for someone to learn about what content is being requested by which nodes.
We can do better (referenced in recent security discussions).
For a node that does not already know a CID, it will not be able to decrypt the response from a query to itself learn who the providers for that CID are, or generate a list of popular CIDs directly.
The text was updated successfully, but these errors were encountered: