>>I agree that you cannot completely be dependent on GPS. And hence we are 
>>looking at Snowball, FluidNexus etc., to obtain the location information if 
>>possible.<<
I am glad you are taking an interest, I will count you in when I get
round to starting the Snowball developer program.

>>Okay, do the two of you, as well as anyone else reading this, want to start a 
>>group/list to talk about how to implement some of these things technically?  
>>There is work on these ideas of local, ad-hoc, mesh- based networking, 
>>especially with the project Haggle (http://www.haggleproject.org), the OLPC, 
>>and Comm.unity ( http://community.mit.edu/ ), among many others, I'm sure.  
>>We could start by looking at how these other projects have tried to implement 
>>things, and whether or not their implementations are trying to be too general 
>>for our own varied purposes.  Let me know by posting here, or by e-mail, if 
>>you're interested.  Nick<<

Definitely count me in!

Thanks for the links.
It seems everyone is using similar sounding technologies to achieve
different aims.
I have a very definite idea as to how this should be implemented to
enable LBS, but have to wait for the technology to catch up ;-)

>>Nice idea.  Maybe it's just me but the music of the video is a bit creepy.  
>>:) What if I am an oppressive government's agent using Fluid Nexus to get 
>>access to activist messages?  Is that possible?<<
To protect secret messages, you use either public or private key
cryptography (or something more exotic if you think your network can
support it).

My focus is instead on how to protect the location (and identity) of
the sender.  This is as much applicable to dating applications as it
is to the evil government scenario.

Unlike “Fluid Nexus”, a Snowball network adds routeing information to
a message as it moves around.  This gives the recipient an idea of how
far away the original sender was and addresses network capacity and
scalability issues.

To protect their privacy, a sender can alter (or randomise) their own
routing information to allow them to hide with a group of nodes (but
paying a penalty with message range).  The question is: how much is
required to defend against different kinds of threats?

There is an unimplemented game called Snowball Fight, where players
(let’s call them agents) have to locate and challenge other players
(say activists) in their area.  I intend arm the “Agents” with some
big brother style sniffing/tracking technology to simulate the tools
available to modern oppressive governments.

This would allow me to collect serious data (via game scoring) and
optimise algorithms to defeat various playing strategies that may
emerge from competitive play.

This idea has some similarities to WifiArmy, although the network
dynamics are very different.
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Android Challenge" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/android-challenge?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to