Chas, Identification can be created with a PKI, just like in BitCoin. if ratings are done as "upvotes", one should prove to be trustworthy before being able to be trusted.
On Tue, Jul 17, 2012 at 8:10 PM, Michael Rogers <[email protected]>wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > On 17/07/12 17:15, Tony Arcieri wrote: > > To actually trick a collaborative filtering algorithm that's > > looking for self-similarity, a "Sybil" (I'm not even sue if that > > word makes sense in this context) would need to participate in the > > network as a good-faith peer. > > I'm not sure that's true in the general case. For example, if the > collaborative filtering algorithm looks for "files rated highly by > peers that give similar ratings to mine" then the attacker can create > one Sybil for each legitimate peer that echoes the peer's ratings and > adds a high rating for virus.exe. The Sybils don't have to do any > useful work, just retrieve and publish ratings. Each legitimate peer > will find that its perfect "taste buddy" gives a high rating to virus.exe. > > Does the Cryptosphere prevent that sort of attack? > > Cheers, > Michael > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.10 (GNU/Linux) > > iQEcBAEBAgAGBQJQBZxzAAoJEBEET9GfxSfMo1kH/1HK52AmPG7EEM094e1jEd2C > 6N6ymr2eSv73DLQJ958nIT8Al2qVZbJR/JoNqbb7a7VFxAdqsqa6Wou32wE/Pwg6 > 3cRJyiiaB3ExBxBVVeeKn+4ayihb6WdDdIQ5kOg/dplanmDvQ4+2WnLjaGJpMzhB > o8mTYvHhG8xMMI+yAFvkgniqUwoL+BE+EWUBARWAY/vyHjXOaKqAOny3C6grdMo4 > sgiTMfdZn+vV3EUVhMyAwJtmn0G7IFLXg4RRmeUl79L8rIpOZXAuj6DD2p+5J1uk > jPIcmkWYoGLW4tj3bNztkzy2rzOu9acUS30FqUGF4g3gDf/ycOs5cGGdk9aWzBM= > =ruuB > -----END PGP SIGNATURE----- > _______________________________________________ > p2p-hackers mailing list > [email protected] > http://lists.zooko.com/mailman/listinfo/p2p-hackers >
_______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
