Okay, so lets say I have a DHT running with 10 clients with a bunch of data in it.
Wouldn't it be relatively easy for a malicious client to run an alternate version of my program, that could do potentially destructive actions to my data(such as replace a key, delete a key, alter data, delete my entire DHT, etc...)
How do I prevent this from happening?
I can only think of:
Checksum verifying the program and only allowing those to connect. But could that be hacked?
Verifying each DHT client with some kind of key.
Does anyone know how to protect against this? Thanks in advance.