i bumped myself again

i'm working on the raw p2p protocol. the cometbft/tendermint protocol
really prioritized resisting mitm and node isolation; [you can
identify the address of every peer] [and this address is then used to
generate the network session keys for communicating with them]. It's
so satisfying to be working with a network that does that.

The bump is the the tendermint servers have a behavior where they
reuse frame memory for efficiency, and keep frames a constant size
[but don't write padding bytes] -- {the data is encrypted with
somebody else's ephemeral key though}
  • Re: [crazy][... Undescribed Horrific Abuse, One Victim & Survivor of Many
    • Re: [cr... Undescribed Horrific Abuse, One Victim & Survivor of Many
    • Re: [cr... Undescribed Horrific Abuse, One Victim & Survivor of Many
    • Re: [cr... Undescribed Horrific Abuse, One Victim & Survivor of Many
    • Re: [cr... Undescribed Horrific Abuse, One Victim & Survivor of Many
    • Re: [cr... Undescribed Horrific Abuse, One Victim & Survivor of Many
    • Re: [cr... Undescribed Horrific Abuse, One Victim & Survivor of Many
    • Re: [cr... Undescribed Horrific Abuse, One Victim & Survivor of Many
    • Re: [cr... Undescribed Horrific Abuse, One Victim & Survivor of Many
    • Re: [cr... Undescribed Horrific Abuse, One Victim & Survivor of Many
    • Re: [cr... Undescribed Horrific Abuse, One Victim & Survivor of Many
    • Re: [cr... Undescribed Horrific Abuse, One Victim & Survivor of Many
    • Re: [cr... Undescribed Horrific Abuse, One Victim & Survivor of Many
    • Re: [cr... Undescribed Horrific Abuse, One Victim & Survivor of Many
    • Re: [cr... Undescribed Horrific Abuse, One Victim & Survivor of Many

Reply via email to