Im not saying its realistic to engineer sha1 collisions to serve up malicious content on a platform like this, but its getting closer every year.
I go into more detail about our platform in this comment: https://news.ycombinator.com/item?id=12758084
It was cool seeing how hashing works under the hood. I used UInt32Array for speed. It is still nowhere near native speed, but fast enough for many applications.
I can't find any support for Opera / IE, unfortunately, although Opera's been based on Chromium since 2013, so... presumably it's been supported for years, as well?
* Cross-referencing against browser release dates, that is.
Also, how much latency does this add due to P2P connection set up time?
And yes, you could see what resources which people are downloading. It isn't a replacement for a server, just a great way to avoid the Slashdot effect. Definitely not privacy-focused, but I could see some smaller websites using it.
Is this supposed to be more of a bootstrap process? Load the first page from the server and then you can use the URL hash to request additional pages from the connected clients?
cachep2p.min.js:9 Uncaught Error: Cannot add duplicate torrent 3cd9bdf4916f422aa77cdd1b952c14202e0eafca
ICE failed, see about:webrtc for more details(unknown)
TypeError: asm.js type error: expecting argument type declaration for 'e' of the form 'arg = arg|0' or 'arg = +arg' or 'arg = fround(arg)'
The whole browser becomes almost unresponsive.
In other words, if I connect to the webpage and just monitor the swarm, can I log all IP addresses that accessed that page?
Would recommend embedding everything (all the HTML and JS) in the error page, so that the it works 'standalone'.
Well, should all DNS servers suddenly die it might be useful but besides that..
But, yeah, still kind of cool.
This scales asset availability with popularity, automatically, for free, with minimal setup.
News to me.