Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Wow, very interesting.

Can you summarizd how the actual algorithm is supposed to work, ie its main ideas?

I am surprised to find that using sha hashes in a tree or DAG will leak information to people who shouldn't have it. Is this a serious flaw and how do these guys ultimately solve the problem? I read the paper but the algorithm seems a bit hard to understand and follow.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: