Doom entirely from DNS records
- kgeist - 459 sekunder sedanI once had this silly idea to create distributed storage of arbitrary data by exploiting a range of completely unrelated sites. Say, when you want to upload your file to the System, it may store one encrypted chunk as an image on a free image hosting site, another chunk as an encoded blog post on a random forum about farming (or in the user profile?), another chunk as a youtube video, etc. Imagine having something like hundreds or thousands of such "backends". Every chunk would be stored in 3 places for high durability of course. Free storage, hidden in plain sight :) Although, I didn't think through how to store the index reliably, and, because a moderator on a random farmers' site may delete our record(s), there needs to be a system which continously validates the integrity and reuploads the chunks.
Maybe such a silly project already exists?
- ktpsns - 7274 sekunder sedanTo clarify, a good title would be "Loading Doom entirely from DNS records"
Neither one plays Doom over DNS nor is the first paragraph in the README correct, because DNS is only abused for storage, not for computing/processing/executing instructions:
> At some point, a reasonable person asked "DNS resolves names to IP addresses, what else can it do?" The answer, apparently, is run DOOM.
- LetsGetTechnicl - 7296 sekunder sedanThis novel form of data storage reminds of me of this classic YouTube video, Harder Drive: https://www.youtube.com/watch?v=JcJSW7Rprio
- thestackfox - 1269 sekunder sedanRespect. But also ... WHY????
Now let's do
(1) A DNS file drop: Split small files into TXT records and rebuild them client-side. Useless for big files, perfect for config blobs, tiny payloads, and cursed demos. Also someone can write an S3-compatible client.
(2) Redis DNS:
- GET foo.cache.example.com -> TXT record returns value chunks
- TTL is the eviction policy
- Cache invalidation becomes even more of a hate crime.
- nasretdinov - 5931 sekunder sedanWaiting for Doom over https://github.com/yarrick/pingfs next
- hhh - 3925 sekunder sedanvery cool, i did something similar but turning the doom frame running on a server into ascii (with colour) and then a small shim to give inputs via subdomains
https://www.youtube.com/watch?v=GoPWuJR6Npc
without the colour i did it in a worse way for bad apple
- kaitari - 4593 sekunder sedanI never stop being impressed by these "<something-crazy> running Doom" posts. AFAIC, whenever we get to Mars, we won't truly have arrived until someone is playing Doom on Mars, and without wasting valuable resources by doing so. Running Doom, the canonical measurement of truly mastering a thing's capabilities.
- tombert - 7537 sekunder sedanGotta admit that it didn't occur to me that "can it run DOOM?" would stretch all the way to DNS.
At this point I am wondering if people will somehow port DOOM over to the MONIAC.
- nullbyte808 - 2889 sekunder sedanMalware could still use DNS records for storage and access to bootstrapped payloads correct?
- lxgr - 3156 sekunder sedanA database storing data? Now I’ve seen everything!
- hun3 - 3928 sekunder sedanFinally, a DOOM download that bypasses captive portals
- - 4034 sekunder sedan
- - 4654 sekunder sedan
- cat-turner - 4914 sekunder sedanSuper cool. Never thought of this. Would this be useful for seeding LLMs?
Nördnytt! 🤓