On Thu, Jul 19, 2012 at 8:09 AM, Chas. <[email protected]> wrote:

> There isn't any way any of this will work. So long as there are unverified
> endpoints (by some third party) there is no way any "trustworthy" system
> can be built  up! What is to prevent me from being both a sybil, and under
> a second identity being just some "random" other party. Once we - as in me
> as a sybil generator and me as a disguised second party - transfer a file
> and sign off on it, I become slightly more trustworthy. So I do this enough
> times, with randomly generated "second parties" and soon I look really "hot
> and trustworthy"!
>
> You need always need at least one trusted party to authenticate every
> transaction. And the question becomes how do you generate that first
> trusted party? Without it all this becomes moot.
>

...
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to