Again, I am much obliged.
So, the client uses the hash to cast about for other 'hash possessors' until a number of them are found? If I understand, how is this accomplished? I thought the original .torrent file had something in it that directed the client to a tracker, that then would check...