>>I agree that you cannot completely be dependent on GPS. And hence we are >>looking at Snowball, FluidNexus etc., to obtain the location information if >>possible.<< I am glad you are taking an interest, I will count you in when I get round to starting the Snowball developer program.
>>Okay, do the two of you, as well as anyone else reading this, want to start a >>group/list to talk about how to implement some of these things technically? >>There is work on these ideas of local, ad-hoc, mesh- based networking, >>especially with the project Haggle (http://www.haggleproject.org), the OLPC, >>and Comm.unity ( http://community.mit.edu/ ), among many others, I'm sure. >>We could start by looking at how these other projects have tried to implement >>things, and whether or not their implementations are trying to be too general >>for our own varied purposes. Let me know by posting here, or by e-mail, if >>you're interested. Nick<< Definitely count me in! Thanks for the links. It seems everyone is using similar sounding technologies to achieve different aims. I have a very definite idea as to how this should be implemented to enable LBS, but have to wait for the technology to catch up ;-) >>Nice idea. Maybe it's just me but the music of the video is a bit creepy. >>:) What if I am an oppressive government's agent using Fluid Nexus to get >>access to activist messages? Is that possible?<< To protect secret messages, you use either public or private key cryptography (or something more exotic if you think your network can support it). My focus is instead on how to protect the location (and identity) of the sender. This is as much applicable to dating applications as it is to the evil government scenario. Unlike “Fluid Nexus”, a Snowball network adds routeing information to a message as it moves around. This gives the recipient an idea of how far away the original sender was and addresses network capacity and scalability issues. To protect their privacy, a sender can alter (or randomise) their own routing information to allow them to hide with a group of nodes (but paying a penalty with message range). The question is: how much is required to defend against different kinds of threats? There is an unimplemented game called Snowball Fight, where players (let’s call them agents) have to locate and challenge other players (say activists) in their area. I intend arm the “Agents” with some big brother style sniffing/tracking technology to simulate the tools available to modern oppressive governments. This would allow me to collect serious data (via game scoring) and optimise algorithms to defeat various playing strategies that may emerge from competitive play. This idea has some similarities to WifiArmy, although the network dynamics are very different. --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Android Challenge" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [EMAIL PROTECTED] For more options, visit this group at http://groups.google.com/group/android-challenge?hl=en -~----------~----~----~----~------~----~------~--~---
