-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Limit flooding of Community Owner's nodes #163
Comments
@cammellos @John-44 I tried to summarize the problem we are trying to solve, please let me know if I am correct. |
Regarding 2, I am not convinced it can be an issue. If a community is token gated then the Community Owner should set the minimal number of tokens to a significant amount (e.g. $5) to stop this kind of flooding. Can you please clarify what is the possible spamming scenario with token gated communities? |
Here are some relevant research done for project plebbit: |
The project plebbit is still designing their decentralized captcha. I am not totally convinced at this stage that we can apply their design to an application level as their design rely on nodes being aware of the captcha protocol and being able to block out spammer that sends captcha challenge requests without captcha challenge solutions. It means that such design would sit better at Waku protocol level. I haven't researched whether an application level protocol could work. |
After further review, please note that it should be possible to use RLN in this scenario. |
Problem
Currently, the Waku (v2) network does not implement anti-spam solutions. Work is currently in progress with RLN waku-org/nwaku#394 https://rfc.vac.dev/spec/17/.
In the following Community type:
Community Owner's nodes have to process and, for manual approval community types, request the Community owner to take action for incoming join requests.
With the current design, the Community Owner and their node can be subject of flooding attacks:
Proposed solution
The text was updated successfully, but these errors were encountered: