On Sat, Jul 21, 2012 at 2:27 PM, James A. Donald <[email protected]> wrote:

> This problem can be mitigated by tracing every purported fact to the
> original alleged observer, and ensuring that you are connected to the
> original observer by a chain of known good people
>

In the system I'm proposing, the largest degree of separation is 1 person:
you are looking at the purported history of the peers you trust *the most*
and have interacted with directly, with potentially suspect ones weeded out
(at least, after you've bootstrapped your way into the network. n00bs may
be ripe to be pwned by sybil networks)

If the social component of the software is easy enough to use, then
hopefully you boostrap your way in via a network trusted friends who lead
you to virtuous friend-of-a-friends and not a giant sybil honeypot network.

-- 
Tony Arcieri
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to