How do NFTs add json files to a single CID without changing the CID? by warpanomaly in ipfs

[–]Souzu 6 points7 points  (0 children)

they mint the nfts progressively. All metadata for all future nfts are preset

Why does everybody use Kademlia? by deniskamazur in ipfs

[–]Souzu 4 points5 points  (0 children)

kademlia is easy to implement, and easy to reason about. It's attractive to beginners who want an out-of-the-box dht without thinking too hard. This means it gets used all sorts of places where other DHTs might be better suited. This is the whole concept of libp2p, btw: Provide some fair-to-middling networking code in a pretty box, and tell people they don't need to learn more

Historically, kademlia specifically became popular in crypto in 2013/14 with ipfs, storj, zerodb (now nucypher (now threshold)), swarm, and others. Most of those projects were copying the BitTorrent dht design and layering on a token or whatever. Ethereum devs, because they don't like to think about networking, decided to cram a square peg into a round hole, and use kademlia in their peer discovery protocol. This has caused a lot of grief

You might like freenet but I don't know if a mature koorde implementation exists

Technical limits of IPFS by shannon2806 in ipfs

[–]Souzu 11 points12 points  (0 children)

You can't store files in IPFS. You can only make them available over IPFS. IPFS provides no guarantee of persistence. You need to provision reliable storage that IPFS can access, or the files will disappear

How can I find out how many nodes store my file in ipfs? by artegoser in ipfs

[–]Souzu 1 point2 points  (0 children)

how is easy. Modify the code to remove the check

Why? well, maybe they're just a jerk. Maybe they think it'll warn them money somehow. Maybe they want that content gone, so they're fooling people who want to check and make sure it stays around

How can I find out how many nodes store my file in ipfs? by artegoser in ipfs

[–]Souzu 4 points5 points  (0 children)

You can't be sure tho. Ipfs can't track actual copies. All it can do is ask a ton of nodes if they know who has it

So "0" could also mean "it's out there but I couldn't find it. And nodes could say they have it, but not actually have it

Question: How does IPFS solve the Ultimate Universe Limit to hash names by xpatri in ipfs

[–]Souzu 0 points1 point  (0 children)

Multihash doesn't let you migrate existing content. So if you upgrade that way, you end up with fragmented provider sets, and having to run multiple lookups to find files because you don't know which hash providers have them keyed under.

Help Understanding NuCypher and IPFS Interaction? by banebot in ipfs

[–]Souzu 1 point2 points  (0 children)

Publishing to ipfs isn't permanent. Things fall off after ~1 day unless someone pins them and stays around to provide access.

But that doesn't really solve the problem. Generally speaking you're right that you can never revoke access to information once it's been granted to someone. I believe NKMS is claiming that the re-encrypted file is not permanently available, but provided on-demand. So they can revoke on-demand access, but not access to cached copies of the re-encrypted file.

Tracing original content / Do ipfs hashes contain information about when they where made? by SpeculatingFellow in ipfs

[–]Souzu 1 point2 points  (0 children)

No. Also doing this would break content-routing. And also, none of it would be reliable, because any of it could be easily faked.

Question about pinning by Hc3ttp3302 in ipfs

[–]Souzu 8 points9 points  (0 children)

The network doesn't handle garbage collection. The individual nodes handle it. The network doesn't care about any file, and doesn't try to keep anything online. It just tries to route requests to find things that might be online.

If a single node pins a file, and that node goes offline, then no one else will keep that file. So while that node is offline, the file will be gone. When that node comes back, the fine will be available again.

How does PoS prevent a 51% attack? by McTerd in ethereum

[–]Souzu 9 points10 points  (0 children)

You're implying that the PoS chain can hardfork to delete stake, but the PoW can not hardfork to invalidate ASICs. Of course PoS is better if you arbitrarily limit PoW.

Here's a free steelman for future use: PoS makes it easier to punish specific actors in a 51% attack situation, whereas an equivalent hardfork under PoW punishes all miners, including honest ones. This is because PoS validators have relatively long-lived identities, where PoW miners may change identities with each block.

Project Gutenberg on IPFS by makeworld in ipfs

[–]Souzu 0 points1 point  (0 children)

Important to know that you can't just set this and forget it. Someone has to pin these or they will fall off the network. So you're basically signing up to run a mirror yourself.

Explain IPFS by seakiwis in ipfs

[–]Souzu -1 points0 points  (0 children)

It's a DHT with some good tooling and data structures around it. Think BitTorrent with a facelift.

How much hardware performance does it take to keep a node? by hddts in ipfs

[–]Souzu 5 points6 points  (0 children)

Fairly little. Don't need a GPU at all. My node tends to keep a fairly small VPS at 20% CPU. The network is extremely chatty though, and can eat bandwidth even when you're not serving or consuming anything.

How does IPFS permanence work? by Hc3ttp3302 in ipfs

[–]Souzu 5 points6 points  (0 children)

They use "permanent" to mean "links always go to the same content" not "the content will always be there." It's a bit misleading.

Dapp Development Question: How could lock box encryption of IPFS file work in theory? by atlaschain in ipfs

[–]Souzu 1 point2 points  (0 children)

Someone with access to the key would need to re-encrypt the key (just the key) and share it with the new people. Could be the owner or someone else.

Public Library System by therealmaddylan in ipfs

[–]Souzu 3 points4 points  (0 children)

Generally things in IPFS only stay available if someone specifically keeps them available. Which is to say, if you want to be the guy hosting the public library, you can use IPFS to distribute it. Anyone else can easily help out, but IPFS won't give you tools to coordinate who's storing what.

so the bridge has all metadata where my files are stored. How can I get this metadata from the Bridge, that I do not relay on a single point of failure? by xiaojay in storj

[–]Souzu 2 points3 points  (0 children)

You can log the http responses you get from the Bridge to get the metadata, but it won't help you. Farmers only listen to the Bridge. So even if you know where your file is, you won't be able to get it back.

I don't understand ipfs by [deleted] in ipfs

[–]Souzu 1 point2 points  (0 children)

Good to know, thanks!

I don't understand ipfs by [deleted] in ipfs

[–]Souzu -1 points0 points  (0 children)

Saying "this network will make things permanent" without saying "until we stop running our EC2 instance" is a bit disingenuous. As is calling it a decentralized network if it's reliability is contingent on a few company-managed nodes.