or
or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up
Syntax | Example | Reference | |
---|---|---|---|
# Header | Header | 基本排版 | |
- Unordered List |
|
||
1. Ordered List |
|
||
- [ ] Todo List |
|
||
> Blockquote | Blockquote |
||
**Bold font** | Bold font | ||
*Italics font* | Italics font | ||
~~Strikethrough~~ | |||
19^th^ | 19th | ||
H~2~O | H2O | ||
++Inserted text++ | Inserted text | ||
==Marked text== | Marked text | ||
[link text](https:// "title") | Link | ||
 | Image | ||
`Code` | Code |
在筆記中貼入程式碼 | |
```javascript var i = 0; ``` |
|
||
:smile: | ![]() |
Emoji list | |
{%youtube youtube_id %} | Externals | ||
$L^aT_eX$ | LaTeX | ||
:::info This is a alert area. ::: |
This is a alert area. |
On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?
Please give us some advice and help us improve HackMD.
Do you want to remove this version name and description?
Syncing
xxxxxxxxxx
Eth 2.0 libp2p Daemon Workshop
tags:
2018_prague_working_group
libp2p
networking
Overview
This document summarises some of the ideas that were discussed in the Ethereum 2.0 workshop examining the libp2p daemon. The workshop was held on 29th of October 2018 in Prague.
This event was preceeded by the following document, which describes the purpose of the meeting: https://notes.ethereum.org/9v_oAYZcSpO0I_pogfHkPA
Attendees
(if you were there, please check your name)
[Lead] Raul (libp2p)
Alexey Akhunov
Zak Cole
Eugene Kabanov (Nimbus/Status)
Kevin Chia
Jannik Luhn
Nicholas Lin
Chih-Cheng Liang
jonny rhea
Steven Schroeder
joseph delong
Luke Anderson (Lighthouse/Sigma Prime)
Priom (ChainSafe/Lodestar)
Paweł Bylica
Mike Goelzer (libp2p) - partial attendance
Objectives
Identify design goals and requirements for libp2p daemon.
Meeting Agenda
To begin the session, a list of outcomes was created, as guided by participants.
(photo of outcome list)
Actual daemon
An overview of the daemon mechanics was provided by Raul (lead), accompanied by this overview diagram.
The overview was summarized (illegibly) by Luke in this diagram.
Windows
D.H.T.
PubSub
Implementation holes
A discussion was had regarding known missing features and shortcomings of the implementation.
Insufficient protocol versioning
Documentation is lacking
Package management is lacking
The code is currently quite hard to follow
Implementation was created before specification
Better governance of the protocol is needed
Adversarial environments
Miner/Validator locations can be discovered
libp2p has looked into peer reputation systems, but that would require a "social overlay" - too much complexity for now.
Would be good to have a "traffic shaper" for Kademlia, rather than just random connections.
Concerning an Eclipse Attack on an Ethereum node using Kademlia
This is more efficient, but more prone to such attacks.
This is less prone to attacks (as the peer layout is not predictable) but the network is less efficient.
It may be possible to incorporate built-in "Circuit Relays", similar to that of TOR.
WASM
Shared memory
Outstanding Questions
What are some of the questions left-over from the discussion?