Hacker News .hnnew | past | comments | ask | show | jobs | submit | httpagent's commentslogin

I am a novice, but I'll do my best to answer. IPFS isn't a replacement for the existing web like many of its predecessors, for the purposes of your question, it really works more like a drop-in shared caching system. The site host doesn't have to participate in IPFS for this to work.

As an example: You host a blog. As an IPFS user, I surf to the blog and store your content in my cache. When another IPFS user attempts to access your blog they may pull directly from my cached version, or from the original host (depending which is fastest). Merkle DAGs are used to hash content for quick locating, to ensure content is up-to-date, and to build a linked line of content over time.

This gets more interesting if there's a widespread service outage. IPFS nodes will continue to serve the most up-to-date version of the web even if the web is fragmented. As new information becomes available it is integrated into the existing cache and then propagated to the rest of the fragments.

I still struggle to understand how this works with databased content, but I do believe IPFS addresses this content.


> The site host doesn't have to participate in IPFS for this to work.

Really?

An IPFS user will scrape HTTP content, republish it over IPFS and update a directory of where non-IPFS content can be found over IPFS?

I must have missed that part.


Yeah - there's a ton of immutable URLs on the web. All of CDNJS/JSDelivr/Google Hosted Libraries, most of raw.github.com, all Imgur & Instagram images, all YouTube video streams (excluding annotations & subtitles), and all torrent file caching sites (like itorrents.org). There are probably some large ones I'm forgetting about, but just mapping immutable URLs to IPFS could probably cover 1/3rd of Internet traffic.

Check out https://github.com/ipfs/archives to learn more.


IPFS archives look like something entirely different from what the grandparent was talking about.

Sure, you can manually publish archives over IPFS, but that's not something that automatically creates an IPFS cache copy of whatever you are surfing.


IPFS archives is the effort that's going on right now to archive sites. Eventually there will be a system for automatically scraping & re-publishing content on IPFS.


Fair enough. Eventually somebody will have to do a lot of work to get all that done then.


Right now storage space and inefficiencies in the reference IPFS implementation are the biggest problems I've hit. Downloading sites is easy enough with grab-site, but my 24TB storage server is getting pretty full :( ... Gotta get more disks.


Say you grab a site. How do you announce that fact, verify that it is an unmodified copy, sync/merge/update copies and deduplicate assets between different snapshots?


How would you prevent fraud?

Say I have a site that sells Awesome Products. L337Hacker mirrors my site, does a DDOS on the original and lets IPFS take over, redirecting the shopping cart to his own site.

Is this a potential scenario? If so, is there any way to prevent it?


If I'm reading this correctly, there are a few ways IPFS could be used in support of distributed, fraud-resistant, commerce.

First: publishing the catalog isn't the same as processing the shopping request. Online commerce is largely an update to catalog + mail-order shopping as it existed from ~1880 - 1990. If someone else wants to print and deliver your (PKI-authenticated, tamper-resistant) catalog, that's fine.

Second: The catalog isn't the transaction interface, it's the communications about product availability. The present e-commerce world is hugely hamstrung on numerous points, but one of these is the idea separating the catalog and product presentation itself from ordering. So long as you're controlling the order-request interface, you're good. A payment processing system which authorised payments via the bank rather than from the vendor would be helpful. Also a move away from account-info sharing.

The key is in knowing who the valid merchant is, and in establishing that the fraudulent merchant has misrepresented themselves as the valid merchant. Perhaps authentication within the payment system would help.

Taking the shopping cart's payment mechanism out of the shopping cart would help.


All IPFS URLs contain the hash of the content, so you can't change it. There's a mechanism to allow for URLs which can point to varying bits of content, but I'm not aware of a paper which shows its security properties.


Upon further reading, it appears that it may be impossible to verify the security of an IPFS cached page, simply because the hash is calculated post-fetch on the client. That allows any sort of shenanigans to be performed on the original content before it's stored.

If content is created specifically for IPFS-caching (similar to Freenet or Onion), then it may be possible to be authoritative, but content cached from the web should never be considered so.


> Upon further reading, it appears that it may be impossible to verify the security of an IPFS cached page

Not at all, rather the opposite, it's very easy to verify a page since the hash is based on the content.

You have file "ABC" that you want to download. So you fetch it and once you have it locally, you hash it yourself and you compare the hashes. If they are the same, you know you have the right thing. If they are different, someone is sending you bad content.


Re-read the original question. If someone is preventing access to the original page and the alternate is being served thru IPFS, there is no way to compare the original. The IPFS cached page becomes the authoritative page and could contain altered content, which the hash takes into account.

If the original page can perform the hash and embed it, that would somewhat alleviate the issue during the fetch, but do nothing to prove that the IPFS-served page was trustworthy or not, unless some third-party knows the original hash, as well.

If the page was served to the IPFS network, to be cached, by a neutral, trusted third-party, that would somewhat alleviate the problem, although there arises the problem of trust again.

The only way to minimize the trust issue is if the page originates from inside the IPFS network and is not a cached version of page originally served outside the network.


You're right. I misread your parent's comment, which suggested that web pages could magically be cached securely into IPFS from the public web without any involvement from the website's owner, which is nonsense.


Mark Karpeles is not currently incarcerated and is busying himself by taunting the twitterverse.

https://news.bitcoin.com/inside-scoop-mark-karpeles-release/

https://twitter.com/magicaltux?lang=en


Oh wow, that news totally passed me by. The knowledge that he was in jail had a definite positive impact on my quality of life.


I've noticed a "know-nothing" strategy recently adopted by blockchain core - basically, the ideas is that community members claim that everyone who isn't part of core development is naive and has no valid position in debating the future of bitcoin. These users speak with pride about leaving social communities because of their ignorance. It reminds me a lot of the Fox news listeners who deride world media as liars.

Here's an example of the proud know-nothingness. The interesting part begins at 17:30. The speaker, Julia Tourianski, makes a fair attack against Mike Hearn for his departure, but then she goes on to point out that developers are faced with low morale because the community doesn't support their work. The conversation then moves to leaving Reddit and other media because "the trolls" (presumably persons who are in favor of a blocksize increase) have taken over.

https://soundcloud.com/heryptohow/julia-tourianski-john-dill...


Augur, a decentralized prediction market, is the biggest anticipated release on the horizon.


Can you elaborate on rootstock not being on top of bitcoin? That was my understanding...


I'm going to offer a wild suggestion - What if reddit is being purposefully dismantled to break up the social hive it represents? Is it possible that current events are he fruition of a purposeful strategy?


Honestly, I wouldn't even be mad if that was actually intentional. Reddit's community in the larger subs has been getting really awful of late.


Here here.

The whole dust up over /r/fph and the few other little subs kinda horrified me. I think reddit has often veered too far into laxness (the LONG existence of /r/jailbait) and there is still an amazing ton of blatant rule violations going on.

The only problem I had with the /r/fph thing was how inconsistently enforced it was. It seemed like a ban against a relatively small group so they wouldn't have to deal with pissing off one of the bigger problem subs. It ended up looking like a fake token gesture.


Yeah, it's probably the Illuminati. Or the Greys.


If that is what is happening, is that what the owners want? Or is that what leadership wants? The leadership has very little money sunk into reedit, but the owners have a lot more.

I'm sure leadership is willing to gamble that they can disrupt the hive without killing it. But will the owners continue to go down that road?


With billions (and billions) of dollars being poured into this year's election cycle, it makes sense for the string-pullers to dismantle any vestige of true grassroots organizing. It seems like the "real" money would be invested in disrupting organic organization and favoring controlled and curated organization that favors their whim. I just can't get this damn tinfoil cap off my head.


Reddit is not meaningfully organized, at least not any more than your average stampede.



Put some pants on, probably.


"I use Ctrl+F5 to make a new request Every time." ~In the voice of Ralph Wiggam.


There's an interesting thread here of a guy called /u/btcrobinhood who monitors these wallets and attempts to return the funds to the original holder.

meta: http://www.reddit.com/r/bestof/comments/296zn4/

original context: http://np.reddit.com/r/Bitcoin/comments/295las/35_of_my_btc_...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: