Read on as we poke around inside the mechanisms that undergird the BitTorrent protocol.
If new peers are discovered, they are added to the list.
My question is, how does DHT work?
(Note: simple explanations are best.)
But how didtheybootstrap themselves?
Eventually, you’ll hit a situation where you better connect to the public Internet.
The tracker that you connect to, for instance, may be itself a DHT node.
The simple answer to your question in bold is,you don’t.
Not in the strictest sense of the word.
Once they’ve staged their attack, they spring it on all nodes all at once.
Wham; every single bootstrapping DHT node is down all in one fell swoop.
You’re stuck with connecting to centralized trackers to download traditional lists of peers from those.
Well, if they attack the trackers too, then you’re really, really up a creek.