Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I really wish they would open source the software. I'm using it in my local network for some unimportant data and it works fine, but I wouldn't trust it with anything remotely important unless I can see the source.


Yes I agree. I am hoping someone reverse engineers the sync protocol so we could build an open source client.

But like I mentioned in the article I am using this to replace a closed source cloud solution I was previously using so it is a step in the right direction.


Writing a new protocol with an open source reference implementation will probably be a better idea, because:

1) Reverse-engineering isn't clean and can be circumvented.

2) BTsync has not reached a point where it can't be beaten by a competing protocol.


We're actively developing an open source Dropbox type app that's powered by Tent (https://tent.io).


you should have a landing page with an email sign up form that you can link people to.


Tahoe-LAFS is a mature project of this nature: https://tahoe-lafs.org/

I am writing a similar project which is fairly immature: https://github.com/cryptosphere/cryptosphere


The particulars of the BT protocol are beyond me, but I thought it would already do a compare between the copy you had and the one on the external server, and only send the relevant bytes to bring everything up to sync again.

Between that and a "compare timestamps to figure out the newest file" I wouldn't think it would be that hard to re-create? What am I missing here?


BitTorrent creates a hashes of your file. The file is broken down into certain size chunks and hashes taken of each chunk. If you already have a piece with a given hash, you won't download it. If a hash differs, it'll be transmitted. The receiver verifies the hash. If it fails it re-requests that piece.

I assume the sync protocol works the same. It hashes the file, checks if any chunks have changed, sends the hash meta-data to the recipient, who then requests and pieces that have changed.


What about hash collisions?


SHA-2 has no collisions found as of yet [1]. The collision attacks on md5 required a lot of junk data, so not sure how much of a problem that would be.

[1]: https://en.wikipedia.org/wiki/SHA-2#Comparison_of_SHA_functi...


Steve Gibson of GRC/Security Now has mentioned (if I remember correctly,) that the protocol/spec will be published, or at least shared with people who have an interest.


That's better than nothing, I suppose, but unless the source is open it's still impossible to trust the proprietary binary.


impossible to trust the proprietary binary

If the protocol is published properly you won't have to: people will write their own free software implementations.


If the spec is published it should be a lot easier to build an open source client.


Take a look at git-annex. It's not quite an apples-to-apples comparison with btsync, but I find that it meets my needs quite well.


I'm using git-annex-assistant right now and while it is really nice and promises to replace dropbox for me, it would still use a lot more loving. There seem to be some weird states that you can easily get it into (I've had issues with the files syncing properly but the webapp claiming that the syncing was failing (or rather, that item is colored red, has an "!", and doesn't say anything else), it does not handle very large numbers of small files well (something git by itself does well),and a few other assorted problems).


Looks like the developer is going to be giving it more loving full time for the next year -- https://campaign.joeyh.name/ almost funded.


Yup! Joey is dedicated as hell which makes me really optimistic about the future of git annex.


Are you implying you actually investigate every piece of code you are running right now? I doubt it. And to do it properly you'd also have to review all hundreds of thousand of lines of code needed to build and run this source else you'll never know if there's a backdoor somewhere. Oh man, and what about your bios? God knows what lowleve packet sniffer is setup in there :]

Just kidding. Partly.


Then how would you know they were using the same source in their binaries?


Why use their binaries? I rather have Debian compile mine.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: