On Sat, Jun 6, 2020, 8:14 AM other.arkitech <other.arkit...@protonmail.com>
wrote:

>
>
>
> Sent with ProtonMail <https://protonmail.com> Secure Email.
>
> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
> On Saturday, June 6, 2020 12:00 PM, Karl <gmk...@gmail.com> wrote:
>
>
> On Sat, Jun 6, 2020, 7:49 AM other.arkitech <other.arkit...@protonmail.com>
> wrote:
>
>>
>>
>>
>> Sent with ProtonMail <https://protonmail.com> Secure Email.
>>
>> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
>> On Saturday, June 6, 2020 11:38 AM, Karl <gmk...@gmail.com> wrote:
>>
>>
>>
>> On Sat, Jun 6, 2020, 7:18 AM other.arkitech <
>> other.arkit...@protonmail.com> wrote:
>>
>>>
>>>
>>>
>>> Sent with ProtonMail <https://protonmail.com> Secure Email.
>>>
>>> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
>>> On Saturday, June 6, 2020 10:17 AM, Karl <gmk...@gmail.com> wrote:
>>>
>>>
>>>
>>> On Fri, Jun 5, 2020, 7:29 PM other.arkitech <
>>> other.arkit...@protonmail.com> wrote:
>>>
>>>> > so your system doesn't have a bloated chain, which is nice. The
>>>> 'consensus' is handled by voting...based one IP address one vote. But how
>>>> robust is relying on IP addresses at the end of the day?
>>>> >
>>>>
>>>> IPv4 provides unique features no other protocol has. address space is
>>>> saturated (scarce) and addresses are not cheap. It is a a nice tool for
>>>> Sybil control
>>>>
>>>
>>> OA, when you say this people start disregarding what you say because it
>>> is false.
>>>
>>> Any software developer can get thousands of IP addresses by altering a
>>> piece of pirated software to include something new of their own design and
>>> sharing it in a venue where it hasn't been shared on before.  There are
>>> many many other ways and people _think_ of them, _use_ them, are _observed_
>>> using them, and things spread and grow.
>>>
>>>
>>> what? any developer geting thousands of public IPv4 addresses by
>>> modifying software?
>>> Nop. That's not true.
>>> (Or I haven't understood well what you say)
>>>
>>
>> People go to places on the internet to download things.  Others can
>> upload things to those places to download.  You can upload something that
>> lies about what it is doing, and gives you use of the ip address of the
>> downloader's computer when run.  Do you understand?
>>
>> It sounds like this is surprising to you?
>>
>>
>> so you refer to computers running malware, that case is contemplated in
>> the design as an 'evil node'
>>
>
> it sounds like you haven't addressed a sybil attack from massively
> distributed malware, which is fine nobody can cover everything.  not sure
> where the design lives.
>
>
> If the malware is distributed in a bigger scale than the honest software,
> indeed, the evil network becomes the 'honest' one to the eyes of the
> software, that's 51% attack.
>
> Provided a world distribution of people that can be evil/honest of
> 80%-20%, the likeliness of an evil network overtaking the honest one is
> lower than the opposite.
>
> The evil network wont work if many evil nodes run behind same IP, so the
> malware must meet the same distribution enforcement applied to the honest
> net. Nodes running malware must be geographically distributed, so local
> marketplaces spreading malware have less chances to spread worldwide in
> order to compromise the network.
>

I'm not sure you're hearing me when I say that one person is able to
distribute malware to thousands (or more) of other people worldwide,
producing a sybil attack from an individual.  Is this something you're able
to repeat back to me?  It sounds like you have an expectation around
handling this?

I also see no reason a malware marketplace would not spread worldwide.

Really struggling to communicate here.  I understand you need to know your
software is given a fair trial to actually run, is that correct?

Reply via email to