Hacker News new | past | comments | ask | show | jobs | submit login

As far as I understand the protocol itself is detectable and censorable both passively and actively, so it's not real anti-censorship in any way. Just a tool that hasn't been added to censoring DPIs yet.



IPFS can work just fine peer-to-peer over Websockets though, which pretty much look like a regular HTTPS connection. Other applications can make use of this too thanks to go-libp2p and js-libp2p.


Is there a feasible alternative to the standard bootstrapping method? What's the plan for when bad actors block access to the bootstrap nodes?


Right now it's just a static list of addresses, but there's definitely more planned. One of the current discussions: https://github.com/ipfs/go-ipfs/issues/3908




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: