The Blockchain
Published in

The Blockchain

Distributed Hosting Hacks

If your background is in computer science, engineering or you have deep understanding of IT, Distributed Hosting does not sound too amazing and disruptive. For some of you it even sounds boring. Let me clarify some things for you. BlackGate, that is the name of this Distributed Hosting project, solves some of the challenges in a clever way.

In difference to classical hosting solution, BlackGate does not need a dedicate server architecture, but makes use of powerful enough consumer devices, like laptops and computers, in the future maybe even your fridge. That not only reused unusued storage, but makes the whole system also censhorship resistant. Hosted pages can be updated in the background, making them offline available for later and increasing the access speed.

This approach is pretty new in the field. Instead of using one global blockchain, each hosted page receives a completely new blockchain. Additional to the scalability gain — only the page creator can create new blocks — it also allows to selective host and keep track of specific pages, without having to download all pages ever created. A hosting algorithm, that will be developed in the scope of the project, will determine what pages should be hosted, in order to guarantee best distribution and availability, but also increased user experience.

As amazing blockchain technology is, it is not build for storage of large data. It keeps track of transactions in a public ledger. In this case page upates and clones (who additional hosts that page). The page data, like images, html, css and javascript, are referenced inside a data cloud. This data cloud is based on the BitTorrent protocol and a bootstrapped Distributed Hash Table (DHT) from the blockchain data.

By using Tor Hidden Services (the .onion domains) it is possible to host pages even behind Firewalls and NATs. This makes distributed hosting on end-user devices possible. An additional side-effect is increased security and privacy. No personal data is exposed and the fact that only static content is hosted makes the attack vector is pretty small.

An update transaction, created by a page owner, includes not only a reference to the updated page, but also checksums for each endpoint. The two endpoints, http://clone.onion/about and http://clone.onion/contact have different checksums if they return different content. Each node that accesses the page, via local configure proxy, checks these checksum and fails if they returned content checksum does not match with the checksum in the blockchain. This makes it possible to return a page from a random node in the blockchain, without relaying on the trust worthiness of this specific node.



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Alex Oberhauser

Founding CEO of @Sigimera and Creator of @BTCFunding - Tech-Entrepreneuer, Blockchain Engineer, Citizen of the World and Inhabitant of the Cyberspace