Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I mean, that definition doesn't fit with supernodes ("seed" nodes in your design) but that is a nitpick.

I guess im mostly just wondering what are the properties you are trying to accomplish. Like there is talk of publicly seeding repositories that are self-certifying, but also using noise protocol for encryption, so what is the security model? Who are you trying to keep stuff secret from? It is all very confusing what the project actually aims to do.

Mostly all i'm saying is the project could use a paragraph that explains what the concrete goals of the project are. Without buzzwords.



I've answered the use-case question here: https://news.ycombinator.com/item?id=39601588

But yes, we're not officially launched yet and the website is going through a rewrite to offer more clarity, thanks for the feedback.

Re: seed nodes: they are running the same software and work the same way as regular nodes, the only difference is how they're deployed (with a public IP address vs. behind a NAT). But yes, a little bit of asymmetry is needed because of NATs/IPv4.

Re: properties: mainly we need to provide encryption and self-certification to enable a similar user experience as GitHub/GitLab/etc. on a an untrusted peer-to-peer network. Additionally though, Radicle offers a level of censorship resitance and disruption tolerance that GitHub cannot offer.


> I've answered the use-case question here: https://news.ycombinator.com/item?id=39601588

I appreciate you think you have, but you haven't. Appeals to vauge lofty notions of digital soverignty and other political values is not what i'm looking for and doesn't really mean much. I'm more looking for a threat model. What does the network accomplish? What are its limits? What are its intended properties?

> Additionally though, Radicle offers a level of censorship resitance and disruption tolerance that GitHub cannot offer.

That seems unlikely (at least as it stands now). Pretty sure it would be much easier to DoS the entire radicle network than to DoS github. It all depends on who you think your attacker is. Github has an excellent track record of standing up to china (for example nytimes archive on github is primarily about bypassing the great firewall of china) it is much weaker on DRM circumvention. All these things depend on how you define them. If you don't define them, and rigorously analyze them, then your censorship resistence is probably wishful thinking.


All nodes can still have equal privilege. Data must originate from somewhere, that is a seed node. And supernode is, or at least was when I studied CS, basically just a more connected node. That said, I agree, a project like this could do with a more formal and structured definition of goals.


> Data must originate from somewhere, that is a seed node

From what i read in their docs, that is not how they are defining seed node.


From https://app.radicle.xyz/nodes/seed.radicle.xyz/rad:z3trNYnLW...

> A seed is a node that hosts and serves one or more projects on the network.

I have not read the entirety of their documentation in great detail, but what I did glance over, I did not see anything particular special about seed nodes other than they host and serve projects. And obviously there is a bit of plumbing required for that.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: