Sent with [ProtonMail](https://protonmail.com) Secure Email.

‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Saturday, June 6, 2020 11:38 AM, Karl <gmk...@gmail.com> wrote:

> On Sat, Jun 6, 2020, 7:18 AM other.arkitech <other.arkit...@protonmail.com> 
> wrote:
>
>> Sent with [ProtonMail](https://protonmail.com) Secure Email.
>>
>> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
>> On Saturday, June 6, 2020 10:17 AM, Karl <gmk...@gmail.com> wrote:
>>
>>> On Fri, Jun 5, 2020, 7:29 PM other.arkitech <other.arkit...@protonmail.com> 
>>> wrote:
>>>
>>>>> so your system doesn't have a bloated chain, which is nice. The 
>>>>> 'consensus' is handled by voting...based one IP address one vote. But how 
>>>>> robust is relying on IP addresses at the end of the day?
>>>>>
>>>>
>>>> IPv4 provides unique features no other protocol has. address space is 
>>>> saturated (scarce) and addresses are not cheap. It is a a nice tool for 
>>>> Sybil control
>>>
>>> OA, when you say this people start disregarding what you say because it is 
>>> false.
>>>
>>> Any software developer can get thousands of IP addresses by altering a 
>>> piece of pirated software to include something new of their own design and 
>>> sharing it in a venue where it hasn't been shared on before.  There are 
>>> many many other ways and people _think_ of them, _use_ them, are _observed_ 
>>> using them, and things spread and grow.
>>
>> what? any developer geting thousands of public IPv4 addresses by modifying 
>> software?
>> Nop. That's not true.
>> (Or I haven't understood well what you say)
>
> People go to places on the internet to download things.  Others can upload 
> things to those places to download.  You can upload something that lies about 
> what it is doing, and gives you use of the ip address of the downloader's 
> computer when run.  Do you understand?
>
> It sounds like this is surprising to you?

so you refer to computers running malware, that case is contemplated in the 
design as an 'evil node'

>>

Reply via email to