The Theseus DHT protocol lets you create distributed hash tables (DHTs) with unusually strong security properties. Can I2P learn anything from this, especially for filesharing applications?
You must log in or # to comment.
The Theseus DHT protocol lets you create distributed hash tables (DHTs) with unusually strong security properties. Can I2P learn anything from this, especially for filesharing applications?