Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You could use something like Gnutella[1], where you flood the network with your query request and that request is then passed along nodes.

Unfortunately (IIRC and IIUC how Gnutella works), malicious actors can easily break that query schema : just reply to all query requests with your malicious link. I believe this is how pretty much every query in old Gnutella clients returned a bunch of fake results that were simply `search_query + ".mp3"`.

1: https://en.wikipedia.org/wiki/Gnutella



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: