| ▲ | cluckindan 7 hours ago | |||||||
And if someone invests in having >90% of the peers offer a malicious file and serve DHTs matching that file? | ||||||||
| ▲ | smt88 5 hours ago | parent [-] | |||||||
Torrent files are hashed, so it's exactly the same risk profile as the comment I was referring to. But generally hashing algorithms are collision-proof enough that what you're describing is basically impossible (requiring many years of compute time). | ||||||||
| ||||||||