>>31652>Can you link/post the paper? Please, I have thought about this sometimes tooI can't find the specific whitepaper I remember reading before, it might be locked behind paywalls now, but the concept is known as a "DNS dead drop" or a "dead drop resolver" and it's often used for covert C&C in botnet and malware networks. DNS is like the ancient legacy backbone that the Internet is forever stuck with and it's a UDP-based protocol with no state or error checking of any kind and there's a lot of nefarious stuff you can do with it. Here is a PDF I found which goes over the general vulnerabilities of DNS as a protocol and some of the ways it can be misused for this sort of thing:
https://blackhat.com/presentations/bh-europe-05/BH_EU_05-Kaminsky.pdf>>31668>I might be dumb but I never understand what's the point of messaging apps. How is that better than social media with DMs?The client-server model works for sending text messages and sharing pictures and videos and stuff like that, but it doesn't work for live video/audio streaming. It is not possible for Discord's servers to handle millions of simultaneous live video/audio streams between all of the Discord users of the world; for video/audio calling, Discord merely functions as a signaling server and it uses WebRTC to create a direct peer-to-peer connections between users for the actual video/audio stream.
>And if you want P2P messaging, why not just self host ?How does anyone find you? How do they connect to you? Are you behind a NAT? Can you forward ports on your router? Do you have a static IP address or a domain name? Is your device a computer on a network that you control or is it a locked-down smartphone that doesn't let you host anything?
>if you have a routing table stored somewhere you don't need dedicated bootstrap serversYeah, if you have the routing table, i.e. if you have connected to the network before (and recently) and have an up-to-date list of active peers on a constantly churning network.
>for example here are some hosts that are active in the DHT right now:The key phrase there is "right now" - check back in a week or so and see if any of those IP addresses are still active in the DHT or if they are even still pingable.
>>31671>Connecting people without centralized rendezvous-points and beyond exchanging addresses with your friends, phonebook-style, appears to be a hard problem in the current network.It's more like an impossible problem, even the parasitic storage solution doesn't really solve the problem; you're still relying on centralized servers, only now it's without the consent of the centralized servers, so theoretically you could use some very well-known public central server like Google's 8.8.8.8 DNS server and devise some way to store small amounts of arbitrary data there and use it as a covert signaling server to facilitate P2P peer discovery between a bunch of random clients. Of course this introduces a whole share of new problems - it would be much more complicated and inefficient and unreliable at finding peers compared to a simple hardcoded list of known trusted bootstrap servers, and Google or whoever is running the service you are abusing would probably figure out how to identify and block your traffic eventually if they figure out what's going on.