13:07 < jrandom> 0) hi 13:07 < jrandom> 1) Net status 13:07 < jrandom> 2) Feedspace 13:07 < jrandom> 3) ??? 13:07 < jrandom> 0) hi 13:07 * jrandom waves 13:07 < jrandom> weekly status notes up @ http://dev.i2p.net/pipermail/i2p/2005-March/000649.html 13:08 < Teal> hi 13:08 < jrandom> (yeah, i was late this time, but close!) 13:08 < frosk> hi 13:08 < jrandom> might as well jump on in to 1) net status 13:08 < jrandom> the net, its, like, up, 'n stuff 13:09 < jrandom> overall throughput is still down where it was before, with a substantial number of dropped messages & fragments 13:09 < bla> hi 13:09 < ant> bad 13:09 < Teal> any clues as to why ? 13:10 < jrandom> Teal: sure, read the status notes? :) 13:10 <+detonate> hi 13:11 < jrandom> there are still ~ 25 people on older builds, and likely, they'll be staying there until we drop them off the net 13:11 < jrandom> in any case, we should be able to work around them, so having them here is actually helpful, i suppose 13:11 < jrandom> (though it'd be nice if they upgraded... ;) 13:11 < cervantes> (hi) 13:11 < frosk> those are probably sheeple who installed i2p because they read about it somewhere and wanted to try "anonymous p2p" 13:12 < ant> yeah, if network quality degradation can happen due to bugs, it's possible due to malice 13:12 < newkid> This is the first meeting I am in, but I read the notes, and the problem seems related to what I explained before the meeting 13:12 < Pseudonym> do we know what specific probblems the old nodes are causing and why? 13:12 < jrandom> bs314159: never attribute to malice what can be attributed to jrandom writing bad code ;) 13:13 < jrandom> Pseudonym: yeah, see the changelog 13:13 < newkid> I run two nodes, milliseconds apart, and they don't regard eacxh other "fast" more of the time 13:13 < jrandom> right newkid 13:13 < jrandom> the speed calculator as deployed is, well, pretty shitty 13:13 < jrandom> it doesnt gather enough data to have any sort of confidence in the values 13:13 < bla> Hmm.. That's bad at best ;) 13:13 < jrandom> its about as meaningless as the "instantaneous rates" you can see on /oldconsole.jsp 13:14 < jrandom> i'm trying out some new calculators, and there is an improvement, but there are problems in the algorithm 13:14 < jrandom> namely, it won't let high capacity peers turn into fast peers without those fast peers dropping from the high capacity group 13:15 < bla> jrandom: Does every node get "fastness" data for the other nodes directly ("P2P"), or via tunnels? 13:15 < jrandom> (aka the first K peers placed in the fast group will stay in the fast group) 13:15 < jrandom> bla: tunnels, we cannot trust direct measurement, as that'd allow trivial anonymity attacks 13:15 < godmode0> "alfYl6RvHzw=" = "21538-900" 13:15 < godmode0> "alV9ye/y/Us=" = "23565-200" 13:15 < godmode0> its is sha1 ? 13:15 < jrandom> (e.g. be really really slow to everyone except Alice) 13:15 <+detonate> they'll stay there for the lifetime of the router? 13:15 < jrandom> godmode0: we're in a meeting right now 13:16 < godmode0> ops sorry 13:16 < jrandom> detonate: until one of them failed or rejected a tunnel (aka their capacity rank drops them from the high capacity group) 13:16 <+detonate> ok 13:17 < bla> bla: Hmm.. This sounds like a problem that ---in order to get _really_ enough_ data--- has to be >>log(N) on the network. 13:17 < jrandom> i've been toying with some ideas to get more data, but haven't updated it yet 13:17 < bla> In terms of load, that is. 13:18 < jrandom> well, one of the critical points certainly is when the network load exceeds the network capacity 13:18 < jrandom> i believe our capacity calculators can handle that though 13:18 < cervantes> jrandom: is -3 actually employing this fast peer selection method? 13:18 <+polecat> Hopefully since data transfer between peers has fairness controls, there won't be any way to increase load too much... 13:19 < bla> jrandom: Well, I mean more specifically: we need to make sure that the "finding out who is fast" algo. stays O(log(N)) 13:19 < jrandom> cervantes: yeah, but as i said, it doesn't allow promoting peers between fast and high capacity 13:19 < jrandom> polecat: fairness controls? 13:19 < cervantes> since I've just realised I've had the proxy enabled, and have been browsing the live web without realising (I did think my connection was a little sluggish) ;-) 13:20 < cervantes> s/live web/outerweb 13:20 < jrandom> bla: i'm not sure we should be dependent upon N. no need to find an optimal 'fastest on the net', merely 'fast enough to handle our data' 13:20 <@smeghead> it would seem i2pProxy.pac is dangerous even for its creator :) 13:20 < jrandom> heh nice cervantes :) 13:20 < jrandom> lol 13:20 < cervantes> so it certainly seems to have improved things on my home node which was really suffering before 13:21 < ant> jrandom: can you randomize it? 13:21 < cervantes> smeghead: hehe hell I don't use that! you think I'm mad! 13:21 < ant> i.e. create a spontaneous transition rate? 13:21 < jrandom> BS314159: we use the tiers, and randomize within the tiers 13:22 < jrandom> BS314159: spontaneous rates are essentially what we have now, which fluctuate widely 13:22 < jrandom> (we == 0.5.0.2-0) 13:22 < ant> I think I don't understand the problem. nm. 13:23 < jrandom> it is tough to do safely and accurately, but i think there's enough data around for us to harvest sufficient info. we shall see 13:23 < bla> jrandom: In any case, finding out a couple of good nodes looks an awful lot like an ant-colony optimization thing 13:24 < bla> jrandom: Because once you've got fast peers, you're likely to use _those_ to find out who else is fast. 13:24 < jrandom> would you propose further active probing along those lines? 13:24 < jrandom> ah, actualy, thats not true 13:25 < jrandom> thats the difference between client tunnels and exploratory tunnels 13:25 < bla> jrandom: And thus, it seems you'd essentially be doing a greedy optimization scheme (much like ant-colony) 13:25 < jrandom> client tunnels are built with fast peers, exploratory tunnels are built with any non-failing peer 13:25 < jrandom> (chosen randomly) 13:26 < bla> jrandom: Hmm.. For anonimity, that's good. However, for quickly finding good tunnel-partners to use, it would be better to use fast peers in the expl. tunnels... The trade-off again 13:26 < jrandom> otoh, there may be something in that vein to help optimize the peer selection 13:26 < jrandom> oh, right, certainly you'd get better performance by using the fast peers, but then you wouldn't be exploring :) 13:27 < jrandom> the exploratory tunnels aren't used for end to end client messages, just for netDb messages, tunnel maintenance messages, and peer test messages 13:27 < bla> jrandom: I see, so effectively, you use random expl. tunnels to prevent falling into local optima? 13:27 < jrandom> so the actual throughput of the exploratory tunnels doesnt matter (as long as the data gets through, eventually) 13:27 < jrandom> aye 13:29 < bla> jrandom: Ok, I see. OTOH: When I use my client tunnels to transfer some data (like downloading from an eepsite), I seems to me (intuitively), that the timing/throughput data on that could also serve as some kind of "passive peers assessment", couldn't it? 13:29 < jrandom> definitely bla, and at the moment, we don't yet harvest that data within the speed selection 13:29 < bla> jrandom: i.e. as an aux. way to get more data on peers 13:30 < jrandom> some of it we can, though some of it will be harder to grab (since the streaming lib is external) 13:30 < jrandom> we should definitely grab what we can though to get more confidence 13:30 < ant> won't that depend on the slowest link in any tunnel? 13:31 < ant> making it very difficult to use for hops>0? 13:31 < jrandom> BS314159: yeah, but it'll average out, as peers are selected randomly within the fast tier 13:31 < jrandom> same goes for any remote measurement 13:34 < jrandom> ok, so thats generally where things stand atm. hopefully we'll have some new calculators & stats up for a -4 or -5 build in the next few days, trying to see how it handles the live net 13:34 < jrandom> anyone have anything else to bring up for 1) Net status? 13:34 < bla> jrandom: It may seem that I'm putting a truckload of emphasis on this, but it seems to me to be a problem that['s very fundamental for a big I2P net to work... 13:35 < jrandom> bla: its certainly important, but remember, we don't need optimal peer selection. merely sufficient 13:35 < ant> morning folks 13:36 < jrandom> all we care about is finding some peers who can handle a tunnel, and making sure those tunnels can handle our data 13:36 < jrandom> 'mornin aum, in time for the meeting :) 13:36 < bla> jrandom: I see. Thnx for the explaination! 13:36 < jrandom> of course, you're right in that it'd be kickass if we /could/ find the optimal peer selection ;) 13:37 < jrandom> and there is definitely lots of room for some students to work out some ideas and write up some papers 13:37 < frosk> this would be a cool thesis project :) 13:37 <+detonate> how workable do you think it would be to actively tweak the parameters of the peer selection until it hopefully settles on something that works, disregarding the impossibility of debugging such a system? :) 13:38 < jrandom> detonate: manual peer selection is a PITA, since fast peers get congested occationally, asking you to back off, etc. 13:38 <+detonate> ah 13:39 < jrandom> i know we could dig into this forever, which is why i've set a milestone of successfully transferring one specific large file through standard tunnels, without disconnect 13:39 <+detonate> alright 13:40 < Teal> Victory at any cost! 13:40 < jrandom> (otoh, there are some undocumented features of the peer selection system to let people weight individual peers manually, but i'm not recommending 'em ;) 13:40 < jrandom> ok, thats 'bout it for 1), now lets swing on to 2) Feedspace 13:41 * jrandom hands the mic to frosk 13:41 < frosk> oh, ok, hi 13:42 < Myo9> Hi Frosk. 13:42 * jrandom gets out the high intensity spotlight 13:42 < frosk> so, everyone should check out http://feedspace.i2p (keys at orion or jrandom's blog) 13:42 < frosk> my devbuddy (which i will out now as ku) and i have started writing some code and have had many lively discussions 13:42 < frosk> also, http://feedspace.i2p/wiki/CallForComments has a fresh rev of the feedspace document :) 13:43 < frosk> hi Myo9 13:43 < frosk> oh yeah, feedspace is our new (and final) name for what used to be known as i2pcontent or fusenet :) 13:43 < jrandom> r0x0r 13:43 < frosk> as the status notes notes, we are still very interested in feedback on the general design of everything 13:44 < frosk> nobody should be shy about challenging it :) 13:44 < frosk> and the web site also lists some "job openings", we could use some helping hands on many aspects of the system and project 13:45 < frosk> we're on a pretty tight schedule and none of us are full-time developers on the project unfortunately 13:45 < frosk> so that's pretty much it, i think. questions? :) 13:45 < ant> * aum can't reach orion.i2p or jrandom's blog, so can't reach feedspace.i2p 13:46 < frosk> hm yes, the web site also has a roadmap, but the dates there _will_ change :) 13:46 < legion> feedspace.i2p=KuW5sR2iGCfnnuwdslHbFsNyNCsoZnoIwAmHeypOV-s8OQxokBpdNazksBrhoQum9nv81vprl6k15Mhcd~KWE4OajjmdU7v2fjqps7QK3KmLv4UTrX-ihSIUdhb5B9FLh2XEFEQ4-8guFTVxBRqQQE~c058AL6~uZpuFpLtEOg0HEZ6BydndOhx-FCDm8ip12pPwZ3a5O86l1UoATZBXxoctGafTjnUlx64jyQs6y0WB811l36wVrc~~dqEcanxab0yfg8dJ~1M4EUNrXcHT-PwYYrr3GgpimuF4oUtYjkeDKlq5WjfMAa8bE73HFgquxq99fuW5aI1JbLPxnTLHi00-2On0dSDwJxSP08HOhKFKMNzykI9Asg8CywzNO6kWpbX9yaML36ohCJF0iaLvvDyhS4a2B65crSJRJPVkbxIvsyyUyYMGi31EK593ijOLjOvug 13:46 < legion> there you go aum 13:46 * jrandom just added feedspace to http://dev.i2p.net/i2p/hosts.txt 13:46 < jrandom> (and cvs) 13:46 * frosk goes temporarily blind 13:46 < jrandom> legion: never paste as a single line, its too large to fit 13:47 < ant> thx 13:47 < frosk> jrandom can probably commit the key into his hosts.txt maybe? :) 13:47 < jrandom> aye, 'tis on there now, forgot to :) 13:48 < frosk> anyway, the plan is to have something simple and functional (and 100% bug-free!) out by I2P 0.6.1, and we'll build more neat stuff in later 13:49 < jrandom> heh wikked 13:49 < frosk> s/out/ready for real-world testing/ 13:49 < frosk> i still can't say if that's realistic or not, but i hope it will be, or we'll continue to cut features ;) 13:49 < ant> since I can't reach feedspace.i2p, I'll ask a basic question 13:50 < ant> that key is not correct, only 441 chars 13:50 < jrandom> right aum, irc trims it, snag http://dev.i2p.net/i2p/hosts.txt 13:51 <+detonate> frosk: i have a suggestion for the meantime 13:51 <+detonate> get something on the i2p router console that grabs a list of updates from the i2p webserver, so people know when to update their routers, etc :) 13:51 < legion> ah sorry, about that. Anyways I've already commited it to my hosts.txt also. 13:51 < ant> thx jrandom 13:51 < ant> which of the following systems do you see feedspace supplanting: usenet, gnutella, google, livejournal, www 13:52 < jrandom> , the church 13:52 < jrandom> er.. 13:52 < cervantes> jrandom: ah you caught me mid commit of hosts 13:52 < ant> i.e. is it a message forum, a filesharing system, a content indexing system, a dynamic page system, and/or a static serving system 13:53 < ant> * aum turns off throttling within routerConsole, and sees if that helps 13:54 < frosk> BS314159: we will support blogs, forums, and shared address books (for the first version, other applications are possible) 13:54 < frosk> it doesn't replace web pages per se 13:54 < frosk> but it certainly could be used for "file sharing" 13:54 <+detonate> content syndication then? 13:54 < jrandom> it'd probably supplant static web content though, allowing persistent web publication for people who cannot run eepsites 13:54 < frosk> that's what it's about 13:55 < jrandom> (two word summary: usenet+SSK) 13:55 < frosk> yeah 13:55 < ant> ok 13:55 < Ragnarok> not that persistent 13:56 < jrandom> Ragnarok: depends on syndicator policy, true 13:56 <+detonate> is anything happening with stasher? 13:56 < frosk> it can be as persistant as the most eager syndicator :) 13:56 < jrandom> (see: dejanews ;) 13:56 < ant> detonate: stasher is on hold, writing a whole new thing called quartermaster 13:57 <+detonate> i see 13:58 < jrandom> frosk: what can we do to help? 13:59 < jrandom> should people register & hack on the wiki, email, post on the forum? 13:59 < jrandom> oh, perhaps we can get cervantes to add a new forum category? 13:59 < frosk> i think actually a forum would be very nice at this point 14:00 < frosk> for more private discussion, you can email us both at ku@mail.i2p and frosk@mail.i2p 14:01 < cervantes> hrrrm ... are you going to put game reviews in it? 14:01 < jrandom> heh 14:01 < jrandom> w3rd 14:01 < cervantes> because if not...then you're welcome to have a new forum section 14:01 < frosk> i was thinking top20 music reviews, cervantes 14:02 < jrandom> (btw, mirror of the call for comments @ http://dev.i2p.net/~jrandom/feedspace.txt) 14:02 < cervantes> :) 14:04 < cervantes> frosk: feedspace or feed space or Feedspace or Feed Space or FeedSpace? 14:04 < frosk> cervantes: Feedspace 14:05 < frosk> looking forward to much discussion over at the forum then :) i don't have anything else for this point, anyone else? 14:05 < jrandom> ok cool, thanks for the update frosk 14:06 <@smeghead> or FEeDspace? 14:06 < ant> frosk: when you have a moment, just pm me a one liner description for the forum section 14:06 < legion> hmm speaking of new forums, lol. I'm putting a new forum site together. Though I have much hacking left to do on the phpbb code, it should be finshed sometime this week. ;) 14:06 < jrandom> cool legion 14:06 < jrandom> that actually brings us into 3) ??? nicely 14:06 < jrandom> anyone have anything else to bring up? 14:06 < jrandom> aum: any updates on Q? 14:07 < frosk> i, uhm, no 14:07 < ant> Q devlt is moving along nicely, nothing to announce atm 14:07 < jrandom> w3rd 14:07 < ant> * aum is 90% complete with net.i2p.i2ptunnel.I2PTunnelXMLServer 14:07 < ant> I have a simple question about netDb 14:07 < ant> everything's working now except 'i2p.tunnel.close' 14:07 < legion> my forums will allow for members to have decent sized avatars, discuss shared content, just about whatever. 14:08 < jrandom> wikked 14:08 < ant> it says on the page that entries are stores on the peers closest to SHA256(router identity + YYYYMMdd) 14:08 < jrandom> right BSpi 14:08 <@smeghead> legion: will it be as much a security hazard as your bt client? 14:08 < ant> does this mean there's a burst of traffic every 00:00 GMT? 14:08 < ant> * aum is actually gaining some fluency in java, having attained a 'cognitive critical mass' 14:09 < jrandom> BS: data points expire more frequently than they migrate 14:09 < jrandom> a LeaseSet is only good for 10 minutes, for example 14:09 < bla> jrandom: Is there a command-line call I can make, such that I can speed estimates of each of the peers in the net over the last, say, 60 seconds, or so? 14:09 < legion> lol, forums a security hazard? 14:10 <@smeghead> legion: yes, and if you don't know that much, i'm already convinced that your forums will be a security hazard 14:10 < jrandom> bla: yeah, java -cp lib/i2p.jar:lib/router.jar -Djava.library.path=. net.i2p.router.peermanager.ProfileOrganizer peerProfiles/* 14:10 < jrandom> (i think) 14:10 < legion> oh and the next release of my bt client shouldn't cause such issues... 14:10 < jrandom> you may need to add some log levels to logger.config, lemmie check 14:10 <@smeghead> legion: Cervantes made a ton of modifications to phpBB to lock it down for i2p use 14:10 < ant> It just seems like having it occur all-at-once at a specified time is awkward. If it were happening continuously, that would seem...smoother. It would also give an attacker less time to mount an attack, since bits of the data would be wrong in less than 24 hours 14:11 < jrandom> nah, it dumps to stdout 14:11 < frosk> jrandom: how do you feel about the i2p roadmap currently, if one may ask? do you think it's realistic? 14:11 < legion> Hmm I wonder if I can get a copy of cervantes mods? 14:11 < jrandom> frosk: i update it when i become uncomfortable with it 14:12 < frosk> ok 14:12 <+detonate> you know, there's a windows installer for python 2.4, one for wxpython, and there's the i2p-bt tarball, i don't really see why anyone would get/trust a third-party release 14:12 < legion> Otherwise I'll just have to continue to hack on the phpbb source myself... 14:12 < jrandom> BS: peers would only look in the wrong place for up to 30s, due to clock synchronization 14:12 <@smeghead> legion: have fun 14:12 < legion> well why would anyone get and use kazaa? 14:13 < bla> jrandom: I'm asking, because... 14:13 < legion> Or morpheus? 14:13 < jrandom> (because they dont know better?) 14:13 < legion> Both of those contain adware/etc... 14:13 <+detonate> they are ignorant? 14:14 < legion> yeah and there are millions of ignorant users out there. ;) 14:14 < ant> legion: you sound like you want to bundle spyware with I2P. Truly, a stroke of genius. 14:14 < bla> jrandom: ...I browsed SpeedCalculator.java and CapacityCalculator.java, and I'd like to experiment with the estimators 14:14 < cervantes> legion: stay uptodate with official patches, and put htaccess on the admin areas 14:14 < jrandom> wikked bla 14:14 < legion> What? Heck no... I hate malware... 14:14 < cervantes> most of my mods involve spam prevention 14:14 < ant> can i raise a more critical issue? 14:14 < legion> That's it? cervantes? 14:15 < jrandom> sup aum? 14:15 <@smeghead> legion: what about your users that also hate malware? why do you do nothing to alleviate any concerns they might have? 14:15 < ant> BS314159: are you a windows hotfix? 14:15 < ant> is it just me, or is there still some flakiness going on with in i2p? i'm having heaps of trouble with even main eepsites, irc etc 14:15 < bla> jrandom: In addition, the idea of "passive fingerprinting" is now in my head (a bit ;): If I receive data through a tunnel, this tells me something about the bandwidth/capacity of all the peers in that tunnel:... 14:15 < jrandom> aum: see the weekly status notes 14:16 < cervantes> legion: rename all registration, login , posting and profile editing pages to something non-standard 14:16 < bla> jrandom: It tells me some about the peer closest to me, somewhat less about the peers one step away, and so progressively less. 14:16 < cervantes> will help keep worms at bay 14:16 < jrandom> bla: aye, i read that timing paper, and yesterday's tor attack paper with much interest 14:17 < Myo9> Cervantes, releasing ant of your mods? 14:17 < Myo9> s/ant/any/ 14:17 < jrandom> there is worry along those lines in the capacity calculator with the different tiers of rejection 14:18 < bla> jrandom: In a way, this gives me some degree of "belief" in a peers bandwidth/capacity (that degree of belief depends on the distance to each of the tunnel members, and on the amount of belief I have on the BW/cap. of the nodes closest to me) 14:18 < legion> thanks for the advice cervantes :) 14:18 < bla> jrandom: Now, I happen to know some ppl that know a lot about Bayesian Belief Networks... ;)) 14:18 <@smeghead> again, legion ignores the question 14:18 <+thetower> I think we're all gonna have to call a truce with legion and let him write whatever he wants, its not like anyone is forced to use it. 14:18 < jrandom> hmm, what do you mean by distance bla? 14:18 < ant> what is legion up to? 14:19 < bla> jrandom: I'll have a chat with them, regarding passive fingerprinting (note: I do not mean "fingerprinting" in the negative sense of the word) 14:19 < jrandom> wikked 14:19 < jrandom> suggestions as to how we can best select 'quality' peers are very much welcome 14:19 < cervantes> Myo9: I certainly could do. 14:19 < legion> Anyways there isn't many i2p windows users just yet and not that many running my i2p-bt binary distribution. Soon my next release will be done and released, it will not have such issues... As there will be a binary and source distribution. 14:19 <@smeghead> why anyone would want to use software from someone who doesn't even take the most basic measures to address users' concerns about security and anonymity is beyond me 14:20 < ant> frosk: what lang you writing feedspace in? (forgive me if i asked you before) 14:20 < cervantes> it's not a clean "patch" or anything though 14:20 < bla> jrandom: distance... Say I have an inbound tunnel X -> Y -> me, and I know a _lot_ about Y's properties, than stats on what I receive thru that tunnel tells me a good deal about X 14:20 < frosk> aum: java (and i forgive you ;) 14:20 < cervantes> I've just been fixing stuff andproblems as it arises 14:20 < bla> jrandom: OTOH, if I have little data/belief on Y's properties, transfer stats don't tell me much about X yet; I first have more to learn about Y 14:20 < cervantes> as they 14:20 < jrandom> bla: its very hard to tell whether lag or congestion occurs @ X or Y (or earlier hops) 14:20 < cervantes> http://forum.i2p/index.php?c=4 14:21 < cervantes> new section: Feedspace 14:21 < jrandom> w00t 14:21 < frosk> yay 14:22 < legion> anyways enough discussion about my release, any further discussion about it should be done in the #itorrent channel 14:22 < bla> jrandom: That is true. However, given large amount of data (and hoping that the measurement time is not _much_ larger than the timescale on which node properties change), I'm convinced there _must_ be information in traffic/tunnel stats 14:22 <@smeghead> legion: we can discuss in meeting point # 3) any business that affects i2p 14:23 <@smeghead> legion: and i think your software is of serious concern and warrants a warning to users 14:23 < legion> yeah, ok 14:23 < jrandom> bla: certainly, we just need to rope in the RTT from the OutboundClientMessageOneShotJob 14:23 < jrandom> (and then figure out how best to calculate & decay the data) 14:24 < legion> So smeghead if you were to make such a release, what would you do differently? 14:24 <@smeghead> legion: the way you continually dodge questions and try to defer discussion on the subject is very disconcerting 14:25 <@smeghead> legion: first of all, release the source to your current binary, no matter if it's "just i2p-bt with smeghead's patch", and have a writeup on your site explaining about your fork 14:25 < bla> jrandom: What does the RTT signify there? 14:26 <@smeghead> legion: it would be helpful to do as i2p-bt does also, and make a changelog indicating all the modifications you've made 14:27 < jrandom> bla: end to end client messages are often (by default, always) bundled in garlic wrapping, containing an additional DeliveryStatusMessage that returns to the sender (through tunnels, of course), allowing the use of AES+sessionTags instead of ElGamal 14:28 < bla> jrandom: (yes) 14:28 <+detonate> as i said, you could just provide a link to the download page for the three things you need for i2p-bt to work, it's straight-forward and gets you exactly the same thing, i can't actually see a use for it besides a trojan 14:28 < jrandom> later on we'll update I2CP (and the SDK) to allow the streaming lib to deliver that same data without requiring the DeliveryStatusMessage 14:29 <@smeghead> detonate: i agree, he should have just submitted a patch to the official i2p-bt in the first place, forking was completely unnecessary and fostered immediate suspicioun 14:30 <+detonate> indeed 14:30 <@smeghead> *suspicion 14:31 < jrandom> ok, anyone else have anything to bring up for the meeting? 14:31 < ant> hi people ! wanted to know, is there anything special with the network ? 14:32 <@smeghead> because of the nature of i2p, applications developed for it require a greater measure of openness with end users and cooperation among developers 14:32 < jrandom> drakoh: see the weekly status notes 14:32 < bla> quit 14:32 < ant> no I mean something strange ... 14:32 <@smeghead> i2p users will always be naturally paranoid to some extent, and it's our duty to do what we can to dispel any concerns we possibly can 14:32 < ant> like I lost all my peers 14:33 < jrandom> aye, agreed smeghead. for anonymity or security software, especially software dealing with a trojan-laden field such as filesharing, its critical to be open. 14:33 < jrandom> drakoh: ok, hold on, we can debug that once the meeting is over 14:33 < ant> woops sorry 14:33 < jrandom> ok, speaking of the meeting being over... 14:34 * jrandom winds up 14:34 * jrandom *baf*s the meeting closed