@ixlone
Okay, important question.
Encryption of P2P traffic: In traditional P2P applications such as
Deluge (created by students & faculty at Oregon State University's Department of Computer Science & Engineering) offer the ability to encrypt the datastream with a form of end-to-end encryption, such that it makes deep packet analysis by ISPs and others extremely difficult.
Since I presume some form of hash (unique identifier) will be associated with each image file—how is data encryption for the traffic set to work, given US ISPs like Comcast are notorious for throttling content?
In the US. with the destruction of Net Neutrality, all US traffic can be throttled—some ISPs are notorious as we generally don't have municipal internet service providers, but rather private corporations [insert rant]. Those rare exceptions are glorious!
I have Comcast Business at my house, which gives me priority speeds with ~15–25 Mbps up and ~75–100 Mbps down. I wager you lot want fiber connections with equal speeds both ways.
Since localized traffic in the US would help reduce latency and improve service, what encryption methodologies have you implemented with the P2P fetching service to help circumvent deep packet analysis (such as end-to-end encryption)? If possible, while by no means perfect, any means to encrypt the streak would certainly help make things harder for those who would wish to harm hosters as well as those ISPs who go throttle crazy.
Anyhow. Thanks for your hard work. And thank you to everyone who participated in this epic level of design work! You are ALL fracking awesome! [Hands out boxes of EPIC Cookies.]
Estimation of Image Cache Size: Do we have a running estimate of the total size of the image cache? How many TBs of image data do we have currently?
Many thanks for answering my questions! :3