Thank you for a very welcoming and helpful response Discordian, especially since my questions lacked adequate clarity. Your remarks help me to return to them with better clarity, at least on behalf of my fellow Newbies.
In asking about possible malware exposure arising from my support of IPFS, I did not have in mind problems that will come up from actions that I take to access any particular addresses.
As I watched the highly varied list of IP addresses being flashed on my screen (by Little Snitch and Virus Barrier) in connection with incoming and outgoing communications involving IPFS, I asked myself what is the potential for âbad stuffâ to be parked in my environment (for future execution if it is code) or for my sensitive information to be transported away by an out-going communication.
This may seem utterly stupid, once I understand exactly what is going back and forth in the IPFS-related traffic; but it seems like a reasonable Newbie-level concern.
So, if you could send me the URL of (or the route to) a doc. where the nature of the IPFS traffic into and out of my system is described in suitable detail, that would move me along to the hoped-for level of calm about the issue.
Second, apologies for my cloudy remark about my ISP. I assume that my level of usage of their services is being tracked, and if my usage gets into certain ranges of volume or pattern their computer will âget upsetâ and threaten to shut down service to me due to â inappropriate useâ of their service.
So the question I ask myself is this: to what extent would my support of IPFS create such a volume of usage, or unusual patterns of usage, as to attract that kind of negative response from my ISPâs computer?
I realize that there is no way for anyone to answer the question without knowing what else Iâm doing with my computers that involve my ISP! Your note is very helpful here because it suggests that what I need to do is to find some way to measure the usage that is specifically connected with my IPFS support, and then decide whether I get measurement results large enough to possibly get into trouble with my ISP. So your suggestion that I keep an eye on the stats and decide what level would keep me out of trouble is what I should try to implement.
I have a key assumption which may be wrong, and it is this: when a node supports IPFS the related traffic can be broken down into two parts. One part is traffic generated by or on behalf of the node owner. The other part is the usage of my environment (by other people/computers) to further decentralize the IPFS system to make it increasingly hard for âpowerful interestsâ to shut it down. My concerns here are focused on the second part only.
Anyway, thanks for your attention to these Newbie questions.
Finally, thanks for the information concerning the places to which I should go to strengthen my support for the work being done in the âIPFS communityâ.