If we can create a DHT node simply and quickly, and we can easily send the address to our contacts, and the contacts can easily add the DHT node to their own accounts, then we can easily use JAMI in some of the harshest network environments, I think it is not difficult.
Of course, we may need to use some third-party software for this process, but I don’t think this has much impact on security.
Quickly share and import links, preferably with dedicated controls responsible for sharing and importing. I believe this can make JAMI more perfect.
If we achieve the above ideas.
So it means Jami can quickly create a temporary node at any time, and then use this temporary node to quickly achieve communication.
The most crucial thing is that it seems that the goal of “communicating through IP addresses” can be indirectly achieved without modifying too many functions.
Especially now that we almost all have IPv6 addresses, I think it would be very useful.
jami already does that.
Local peer discovery in the options will send a broadcast on local network, else any Jami client can serve as a bootstrap as it embeds a DHT node.
It was fantastic, jami was very good, I was watching Using Jami from China - #37 by hkk
In fact, jami can build a new DHT to adapt to the extreme Internet environment.
The existing output bootstrap address, and the way to import bootstrap address, is sometimes not intuitive, can you consider simplifying these two steps?
Hey guys, I have to say that the new interface is more harmonious and beautiful. Thank you to the production team for bringing us such exquisite software.
In fact, I hope to have a control that facilitates us in exporting and importing DHT network addresses, in the form of text or links, so that we can build a concise but effective DHT network faster.
I was thinking about methods to automate the process and enhance reliability of the decentralized network: If that mobile app can guarantee access to blocked web sites, and the source code is public, then Jami can use this as a fallback mechanism (to import a list of DHT addresses from the web automatically when the default bootstrap node is not accessible.) It can also help with call set-up when the TURN server is blocked.
If you can access the bootstrap node (or you have some valid DHT addresses cached on your device), and your friend can connect to your device, then Jami should automatically relay some DHT addresses to your friend. But I suppose [this] method could be useful too.
What happens if you use the 5G cellular radio in your phone with a peer-based mesh protocol, instead of the normal client / server protocol? --If you have enough people who use the same protocol, you have an unstoppable DHT network. And then you only need one person with [this] to bootstrap an entire city.
Another idea has occurred to me: as SMS traffic is never blocked, you could build a server application that dispenses random DHT bootstrap addresses via SMS. Then Jami could use the internal SMS API of the mobile OS to import a DHT peer list automatically if the normal method fails.
Above all else we must have secure texting that works reliably in every country and does not require telephone numbers for registration. We can always leverage what is permissible, popular or indispensible. But everything must be easy, automatic, and user-friendly or we will never convince a majority of the population to use that instead of WeChat / WhatsApp / Telegram / Signal, et cetera.
The concept of manual DHT node list importing is ultimately fatalistic because the general public will never bother with this. Jami should address the network performance & file distribution problems first, otherwise people will not even want to use it. When you reach the point where manual intervention by the user becomes necessary, it represents an engineering & logistical failure. We can do better than that:
WeChat is useless outside of china because it does not accept western phone numbers for account registration (and often blocks foreign accounts after some time has passed.) And WhatsApp / Telegram / Signal traffic is blocked. Thus commerce and family relations are obstructed. The P2P messaging app which overcomes these obstructions has the greatest chance of succeeding in the global marketplace.
We must also adopt standard protocols for decentralized information infrastructure, or the technology will not become popular and the global DHT will not grow. The first step in that process is to identify which protocols are most efficient, robust and resilient – so test reports from other applications and users on adversarial networks should be welcomed here. Jami could also support multiple transport protocols as modular plug-ins… (in fact it may have to do so in order to remain relevant and useful when confronted by transport interference on one side and superior P2P protocols on the other.)
Messaging apps that use the ‘HolePunch’ protocol can update the app automatically through the P2P network, (which solves the Jami file distribution problem.)
" Holepunch is a fully encrypted protocol that is designed to unlock global communications, empower freedom of speech and combat censorship around the world. "
In fact, each of us has a unique IP address, which allows us to accurately locate each person. However, this IP address may be subject to change. Therefore, I propose using WeChat, WhatsApp, or various email . My goal is to exchange IP addresses through these relatively stable but not secure contact methods, thereby achieving encrypted communication. From this perspective, as long as private communication based on IP addresses is not prohibited, we can achieve encrypted communication.
It is difficult for the government to prohibit encrypted communication based on IP addresses, so for familiar people, this method is also the most stable.
If dht can be strong enough to resist the blockade of cutting off the Internet initiated by the government, then we don’t need to emphasize more complex ways for users.
Jami can theoretically be used as long as there is a network, whether it is the Internet or a local area network. However, I am always concerned about whether DHT can withstand attacks that cut off the international Internet. If the international Internet is cut off, can Jami still connect to the main DHT nodes and function normally?
Can we build a DHT in a closed country’s network to enable jami to work normally? I mean, even if the Internet is suddenly cut off, it will not affect the normal use of jami users, such as Iran or North Korea. Or has this problem been solved? To be honest, as I am a layman, I don’t know about these things.