I agree with your arguments completely, and I've come to similar conclusions (except with dat and ipfs) when I decided how to build my peer to peer web browser network.
Unfortunately, in the real world peer to peer is a different problem due to carrier-grade NATs everywhere. I have to implement malware-like exfiltration and smuggling techniques in order to build an end to end encrypted network, because pretty much down the infrastructure is unreliable and manipulated by ISPs wherever they can, including unencrypted DNS or even DNS via TLS ports being blocked completely off the internet. [1]
Without those protocol in protocol techniques there'll always be a single point of failure, like with all "dApps" that are actually just gatekeepers on a centralized domain as a point of entry for their network. Those usually can be blocked off so easily that it's ridiculous to call them decentralized.
Somehow, between the 2000s and now, the internet got so crippled for endusers that it boggles my mind how that happened without resistance.
Unfortunately, in the real world peer to peer is a different problem due to carrier-grade NATs everywhere. I have to implement malware-like exfiltration and smuggling techniques in order to build an end to end encrypted network, because pretty much down the infrastructure is unreliable and manipulated by ISPs wherever they can, including unencrypted DNS or even DNS via TLS ports being blocked completely off the internet. [1]
Without those protocol in protocol techniques there'll always be a single point of failure, like with all "dApps" that are actually just gatekeepers on a centralized domain as a point of entry for their network. Those usually can be blocked off so easily that it's ridiculous to call them decentralized.
Somehow, between the 2000s and now, the internet got so crippled for endusers that it boggles my mind how that happened without resistance.
[1] https://github.com/tholian-network