▲ | hackingonempty 3 days ago | |||||||||||||||||||
> There is no validation that an infohash corresponds to a real torrent—any client can announce anything. Many crawlers and indexers continuously pick random or sequential infohashes and announce themselves so they can later detect other announcers, and malicious clients or poorly written bots can spam the network with anything they like. There are also valid clients for completely unrelated protocols using the BitTorrent DHT to find each other. | ||||||||||||||||||||
▲ | sneak 3 days ago | parent [-] | |||||||||||||||||||
Which? I'm always fascinated by the use of public p2p nets to serve other protocols. The first complete standalone program I wrote was a gnutella p2p client. | ||||||||||||||||||||
|