On 11/09/17 22:48, Arne Babenhauserheide wrote:
> 
> Matthew John Toseland <matt...@toselandcs.co.uk> writes:
>> Applied to spam, for example, we could justify banning somebody by
>> showing some of his messages.
>>
>> Does it still allow for spam amplification? Probably, if we immediately
>> propagate inserts to everywhere. But maybe we can resolve the fight
>> within a few small random parts of the network. And the fact that you
>> can only vote once per darknet connection on any given key severely
>> limits the mischief you can do... so maybe it's manageable even with
>> full propagation.
> 
> How would we avoid having to interact with all inserts?

Simple answer: we don't. We propagate every insert to everyone
listening, for a sufficiently popular key.

This is viable on a darknet, because we assume the attacker has a
limited number of edges.

Possibly better, more complex answer: Each insert is routed along a
fixed pseudo-random route. If there is a conflict, we make the newly
inserted data available within a limited range of where it ends up. If
the users/clients like the data, they reinsert it, and it propagates
further. Once there are enough inserts the winning data goes everywhere.
> 
>>> Because it's our only source of scarcity. The whole objective of this
>>> part of the proposal is to create spam-proof, adequately-scalable
>>> distributed keyword search. Or distributed data structures of whatever
>>> other kind, where we can maintain the structure in a collaborative
>>> manner, obtaining a consensus, without having to poll every outbox and
>>> every fork.
> 
> I agree that our darknet structure is our only real source of scarcity
> (but only in the immediate region: One malicious darknet peer can
> introduce an arbitrary number of additional distant peers).
> 
> But I’m wary of mixing the darknet structure too much with content. For
> scalable keyword search we could already use the WoT and merge
> information from identities — with efficient transfer, because the data
> will be widely cached.

I'm skeptical that this can work well:
1) It may or may not be possible to make it scale adequately.
2) It's hard to maintain efficient distributed data structures such as
search indexes.
> 
> What I’d be more interested in is to see whether we can use darknet
> connections with something like blinded tokens to allow introducing WoT
> IDs without CAPTCHAs while keeping the WoT IDs separate from the darknet
> structure. I’d like to be able to offer a friend who installs Freenet
> something which allows him or her to introduce a few WoT IDs.

Exactly. Even if WoT works, it depends on some external source of
scarcity. So we need some way to use darknet scarcity for introductions
(to prevent DoS/spam), without giving away too much information. But as
far as I remember there hasn't been an implementible scarce keys
proposal, just a lot of hand waving. If you have one then by all means
make it.

The above is a slightly different approach, which may have some
advantages for particular applications. But we need *something* in this
approximate area.
> 
> Best wishes,
> Arne

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to