this post was submitted on 23 Nov 2024
462 points (96.2% liked)

Showerthoughts

30000 readers
512 users here now

A "Showerthought" is a simple term used to describe the thoughts that pop into your head while you're doing everyday things like taking a shower, driving, or just daydreaming. A showerthought should offer a unique perspective on an ordinary part of life.

Rules

  1. All posts must be showerthoughts
  2. The entire showerthought must be in the title
  3. Avoid politics
    • 3.1) NEW RULE as of 5 Nov 2024, trying it out
    • 3.2) Political posts often end up being circle jerks (not offering unique perspective) or enflaming (too much work for mods).
    • 3.3) Try c/politicaldiscussion, volunteer as a mod here, or start your own community.
  4. Posts must be original/unique
  5. Adhere to Lemmy's Code of Conduct

founded 2 years ago
MODERATORS
 

Had this thought the other day and tbh it's horrifying to think about the implications of one, or God forbid all, of them going down.
Stackoverflow too but that only applies to nerds haha

you are viewing a single comment's thread
view the rest of the comments
[–] possiblylinux127@lemmy.zip 3 points 3 weeks ago (1 children)

The data would be hashed so any changes would be thrown out.

[–] csm10495@sh.itjust.works 1 points 3 weeks ago (1 children)

Hashed by whom? Who has the source of truth for the hashes? How would you prevent it from being poisoned? .. or are you saying a non-distributed (centralized) hash store?

If centralized: you have a similar problem to IA today. If not centralized: How would you prevent poisoning? If enough distributed nodes say different things, the truth can be lost.

[–] possiblylinux127@lemmy.zip 1 points 3 weeks ago (1 children)

This is a topic that is pretty well tested. Basically the data is validated when received.

For instance in IPFS data is tracked by its hash. You request something by a CID which is just a hash.

There are other distributed networks and they all have there own ways of protecting against attacks. Usually an attack requires a huge amount of resources.

[–] csm10495@sh.itjust.works 1 points 3 weeks ago

Even in ipfs, I don't understand discoverability. Sort of sounds like it still needs a centralized list of metadata to content I'd, etc.