On Tue, Jul 17, 2012 at 3:21 PM, Michael Rogers <[email protected]>wrote:
> Thanks for the explanation. Could you say a bit more about what > information a peer publishes (and signs?) about itself and others? > What prevents a Sybil from claiming to have had the same interactions > as another peer, in order to gain that peer's trust? I'd like both sides to sign off on both a completed file transfer and a completed file storage lease. Failure to do so would prevent ongoing relationships. Sybils can claim whatever false histories they want, however the assumption is that, through normal system operation, a given peer will come into contact with more truthful peers than Sybils, and that by virtue of that the false histories concocted by Sybil networks will be noise filtered out by a collaborative filtering algorithm. Each peer is looking for patterns in the data (specifically self-similarity) across the combined histories of every peer they've ever interacted with. As long as they are able to reach a majority of "trustworthy peers" then hopefully the false histories concocted by colluding Sybils will be irrelevant. -- Tony Arcieri
_______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
