On Thu, Jul 19, 2012 at 8:09 AM, Chas. <[email protected]> wrote:
> There isn't any way any of this will work. So long as there are unverified > endpoints (by some third party) there is no way any "trustworthy" system > can be built up! What is to prevent me from being both a sybil, and under > a second identity being just some "random" other party. Once we - as in me > as a sybil generator and me as a disguised second party - transfer a file > and sign off on it, I become slightly more trustworthy. So I do this enough > times, with randomly generated "second parties" and soon I look really "hot > and trustworthy"! > > You need always need at least one trusted party to authenticate every > transaction. And the question becomes how do you generate that first > trusted party? Without it all this becomes moot. > ...
_______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
