logoalt Hacker News

cluckindanyesterday at 11:18 PM1 replyview on HN

And if someone invests in having >90% of the peers offer a malicious file and serve DHTs matching that file?


Replies

smt88today at 1:16 AM

Torrent files are hashed, so it's exactly the same risk profile as the comment I was referring to. But generally hashing algorithms are collision-proof enough that what you're describing is basically impossible (requiring many years of compute time).

show 1 reply