About | Archives | Contribute
A discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering.
Once upon a time, decentralized networks were slow and burdensome, using tons of bandwidth for communication and coordination. Distributed Hash Tables (DHTs) changed all that, allowing vast decentralized databases to be built with ease and yet have no central point of control. We look at the various DHTs and how they work, and investigate the specifics of Khashmir, a Python implementation of the Kandemlia DHT.