On Tue, Jul 17, 2012 at 3:21 PM, Michael Rogers <[email protected]>wrote:

> Thanks for the explanation. Could you say a bit more about what
> information a peer publishes (and signs?) about itself and others?
> What prevents a Sybil from claiming to have had the same interactions
> as another peer, in order to gain that peer's trust?


I'd like both sides to sign off on both a completed file transfer and a
completed file storage lease. Failure to do so would prevent ongoing
relationships.

Sybils can claim whatever false histories they want, however the assumption
is that, through normal system operation, a given peer will come into
contact with more truthful peers than Sybils, and that by virtue of that
the false histories concocted by Sybil networks will be noise filtered out
by a collaborative filtering algorithm.

Each peer is looking for patterns in the data (specifically
self-similarity) across the combined histories of every peer they've ever
interacted with. As long as they are able to reach a majority of
"trustworthy peers" then hopefully the false histories concocted by
colluding Sybils will be irrelevant.

-- 
Tony Arcieri
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to