i bumped myself again
i'm working on the raw p2p protocol. the cometbft/tendermint protocol really prioritized resisting mitm and node isolation; [you can identify the address of every peer] [and this address is then used to generate the network session keys for communicating with them]. It's
On 7/29/23, Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote: that is, the public key that is hashed to make the address, signs the shared key in the handshake
so satisfying to be working with a network that does that.
The bump is the the tendermint servers have a behavior where they reuse frame memory for efficiency, and keep frames a constant size [but don't write padding bytes] -- {the data is encrypted with somebody else's ephemeral key though}