Sent with [ProtonMail](https://protonmail.com) Secure Email.
‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ On Saturday, June 6, 2020 11:38 AM, Karl <gmk...@gmail.com> wrote: > On Sat, Jun 6, 2020, 7:18 AM other.arkitech <other.arkit...@protonmail.com> > wrote: > >> Sent with [ProtonMail](https://protonmail.com) Secure Email. >> >> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ >> On Saturday, June 6, 2020 10:17 AM, Karl <gmk...@gmail.com> wrote: >> >>> On Fri, Jun 5, 2020, 7:29 PM other.arkitech <other.arkit...@protonmail.com> >>> wrote: >>> >>>>> so your system doesn't have a bloated chain, which is nice. The >>>>> 'consensus' is handled by voting...based one IP address one vote. But how >>>>> robust is relying on IP addresses at the end of the day? >>>>> >>>> >>>> IPv4 provides unique features no other protocol has. address space is >>>> saturated (scarce) and addresses are not cheap. It is a a nice tool for >>>> Sybil control >>> >>> OA, when you say this people start disregarding what you say because it is >>> false. >>> >>> Any software developer can get thousands of IP addresses by altering a >>> piece of pirated software to include something new of their own design and >>> sharing it in a venue where it hasn't been shared on before. There are >>> many many other ways and people _think_ of them, _use_ them, are _observed_ >>> using them, and things spread and grow. >> >> what? any developer geting thousands of public IPv4 addresses by modifying >> software? >> Nop. That's not true. >> (Or I haven't understood well what you say) > > People go to places on the internet to download things. Others can upload > things to those places to download. You can upload something that lies about > what it is doing, and gives you use of the ip address of the downloader's > computer when run. Do you understand? > > It sounds like this is surprising to you? so you refer to computers running malware, that case is contemplated in the design as an 'evil node' >>