On 13/09/17 21:23, Arne Babenhauserheide wrote:
> 
> Matthew John Toseland <matt...@toselandcs.co.uk> writes:
> 
>> On 12/09/17 22:34, Arne Babenhauserheide wrote:
>>>
>>> Matthew John Toseland <matt...@toselandcs.co.uk> writes:
>>>> But we need *something* in this approximate area.
>>>
>>> I fully agree with that. I think however that we need to be careful not
>>> to require user interaction for that. Users already added the friend, we
>>> can’t require more than maintaining the friend connections. Otherwise
>>> that would be the next bottleneck.
>>
>> What makes you think we'd need user interaction?
> 
> That’s how I understood it.
> 
>> If there is any deconfliction it's all at the client level, not the
>> node. The client can enforce any appropriate rules and decide to cast a
>> vote by reinserting the block it most prefers. The user might get
>> involved if there's a dispute about e.g. eliminating spammers.
> 
> I don’t understand how the client casts votes without exposing the
> data it uses to decide how to vote. How do you avoid coupling private
> data with the insert decisions?

For the one proposal that involves votes, a vote is effectively an insert.
> 
>> Proposal 0: Bundles
>> -------------------
>>
>> If an SSK insert has maximum HTL, we pre-route it along a fixed
>> pseudo-random path, which ideally doesn't change for a given source
>> node. It only uses friend connections, and stays at max HTL until a
>> pseudo-random termination point (always the same node on a static
>> network). After that it turns into an ordinary insert.
> 
> Do I understand it correctly that this means that all inserts from a
> given source initially travel along the same path?
> 
> If yes, then it sounds good.

Right, this is the poor man's tunneling scheme. Although one day perhaps
we could have something like PISCES.
> 
>> There are tricks we can use to compensate for churn by using shadow
>> nodes so that even if we can't route it to fixed peer A, we route it to
>> fixed peer B instead, but the following hop is the same (possibly using
>> FOAF connections and proof of previous arrangements and whatever).
> 
> That sounds like quite a bit of additional complexity but a nice
> longterm goal.
> 
> It would be great to have this for requests, too, since this would
> clearly stop most correlation attacks which are used right now.
> 
>> Proposal 1: Scarce SSKs with global (per-node) scarcity
>> -------------------------------------------------------
> …
>> Proposal 2: Scarce SSKs with per-key scarcity and multiple versions
>> -------------------------------------------------------------------
> …
>> Proposal 3: Scarce SSKs with voting
>> -----------------------------------
> …
> I don’t really understand these three. They all sound like they could
> leak information from the anonymous ID layer to the networking layer.

I don't see why. Maybe you can make an argument re voting schemes. But
what is wrong with proposal 1 that makes it any different security-wise
to what happens now?

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to