generalize explanation (distributed ledger technology with blockchain being an example)
Signed-off-by: Stephen L. <lrq3000@gmail.com>
This commit is contained in:
parent
0fa2d742de
commit
8bda231ca0
@ -139,7 +139,7 @@
|
||||
|
||||
<p>Peer-to-Peer instant messengers connect directly to each other without requiring third-party servers. Clients (peers) usually find each other through the use of a <a href="https://en.wikipedia.org/wiki/Distributed_computing">distributed computing</a> network. Examples of this include <a href="https://en.wikipedia.org/wiki/Distributed_hash_table">DHT (distributed hash table)</a> (used with technologies like <a href="https://en.wikipedia.org/wiki/BitTorrent_(protocol)">torrents</a> and <a href="https://en.wikipedia.org/wiki/InterPlanetary_File_System">IPFS</a>, for example). Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the <a href="https://www.scuttlebutt.nz">Scuttlebutt</a> social networking protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made.</p>
|
||||
|
||||
<p>Non peer-to-peer distributed networks route encrypted messages through a network of user operated nodes. The sender and recipient never interact directly, and hence there is no leak of IP addresses. With onion routing (eg, <a href="https://en.wikipedia.org/wiki/Tor_(anonymity_network)">Tor</a>), nodes cannot decrypt messages, only the recipient can. Another example is <a href="https://en.wikipedia.org/wiki/Blockchain">blockchain</a> technology, although there is no guarantee of anonymity.</p>
|
||||
<p>Non peer-to-peer distributed networks route encrypted messages through a network of user operated nodes. The sender and recipient never interact directly, and hence there is no leak of IP addresses. With onion routing (e.g., <a href="https://en.wikipedia.org/wiki/Tor_(anonymity_network)">Tor</a>), nodes cannot decrypt messages, only the recipient can. Another example is <a href="https://en.wikipedia.org/wiki/Distributed_ledger">distributed ledger technology</a> (e.g., <a href="https://en.wikipedia.org/wiki/Blockchain">blockchains</a>), although there is no guarantee of anonymity.</p>
|
||||
|
||||
<p>Softwares can combine multiple approaches, such as Briar using peer-to-peer for local network and Tor for remote connections over the internet, whereas Session always uses onion routing over a blockchain to incentivize nodes.</p>
|
||||
</div>
|
||||
|
Reference in New Issue
Block a user