On Monday, May 16, 2016 Susheel Daswani wrote: > Lately been focusing on mobile and poker but I'm definitely > sad that the 'p2p' moniker has been usurped by the likes of > Uber, AirBnB, etc.
Hey, of all people, Travis Kalanick has all the rights to use it - he probably inherited it from Red Swoosh when no one else wanted it! :) Best wishes - S.Osokine. 16 May 2016. PS: Poker is good. I hear good players can make some good money. ________________________________ From: p2p-hackers [mailto:[email protected]] On Behalf Of Susheel Daswani Sent: Monday, May 16, 2016 9:18 AM To: theory and practice of decentralized computer networks Subject: Re: [p2p-hackers] lists.zooko.com mailing list memberships reminder I'm still here. Lately been focusing on mobile and poker but I'm definitely sad that the 'p2p' moniker has been usurped by the likes of Uber, AirBnB, etc. 😂 Mobile devices hold great p2p promise but given their networks are controlled by the carriers they can't ably act as bidirectional nodes. On Monday, February 8, 2016, Drew Winget <[email protected]> wrote: I joined about a year or a year and half ago perhaps, so I don't know what the "good old days" were, but I'll be happy to see them rekindled. My primary interests are in having unified interfaces for distributed resources. IPFS <https://ipfs.io/> , Stronglink <https://github.com/btrask/stronglink> , IPLD <https://github.com/diasdavid/js-ipld> , Camlistore <https://camlistore.org/> and Mediachain <https://medium.com/mine-labs/introducing-mediachain-a696f8fd2035#.dumcuds04> all seem like very worthwhile and promising approaches to a user-owned-and-operated web of knowledge/media which protects users while providing enough abstraction on top of which to build a seamless interface. Ultimately I would love to use a web entirely owned by the end users, down to radio/mesh-networked hardware, with perhaps some large coordinating hardware owned in a cooperative fashion through some kind of cryptocurrency royalties system. This was the original vision of the web (Vannevar Bush, Doug Engelbart, Ted Nelson (though he's a bit more of an authoritarian), etc.). In general, http is a ghetto; an new solution is needed at the protocol level, based on an evolving, interoperable open standard. IPLD and Mediachain are particularly interesting in this area, since they are explicitly aimed at migrating linked data into the merkle dag, so that search and context modelling can be done collaboratively and stored in a way that can guarantee attribution. On 7 February 2016 at 21:06, Alen Peacock <[email protected] <javascript:_e(%7B%7D,'cvml','[email protected]');> > wrote: Still here, but often forget to check the folder these messages dump into... This list is where I first announced the flud project and the primary location I announced subsequent early releases. Since that time the tech evolved into Space Monkey and a very fun ride through startup land -- all built on serious p2p arch. Internally, we still refer to the codebase as "flud," although I'd be surprised if a single line of code from the original project still exists in the current product/service, and the core architecture has evolved in drastic ways too. What other companies have been founded by list alumni? I know of Uber (Kalanick), Expensify (Barrett), Zcash (Zooko), Space Monkey (me). Others? Cheers! Alen On Tue, Feb 2, 2016 at 3:00 PM, Aymeric Vitte <[email protected] <javascript:_e(%7B%7D,'cvml','[email protected]');> > wrote: > The problem maybe is that one cannot invent one system/network per need > and expect a sufficient number of users to understand how each one > works, how they can use them and trust them so they can fly. > > See only the bittorrent network, users have generally no idea what's > behind, leading to funny (new) things like > https://github.com/Ayms/torrent-live#deanonymizing-the-vpn-peers > > That's why I thought about https://github.com/Ayms/node-Tor#convergence > > Sorry for the too short description for now but that's not a vague idea > at all, the list of services not being exhaustive and the concept being > to be able to build and deploy them easily on top of the Convergence > architecture (using browsers and WebRTC). > > One of the issues being that the standard bodies still do not get that > the model of an app inside browsers tied to a domain and associated TLS > certificate(s) is an obsolete concept that should be replaced by an > entity ID system, different from what is proposed today (ie "securing" > for example a WebRTC peer connection via its Google account) > > Le 02/02/2016 20:38, Meredith L. Patterson a écrit : >> I don't know that much is stopping people from building P2P systems >> today; Michal Wozniak gave a talk at 32c3 about the plethora of >> decentralised social networking systems out there these days, currently >> more than 50 of them listed on Wikipedia alone. Many of them federate at >> the HTTP layer, but it seems like the content bootstrapping problem >> continues to be a challenge in getting these systems to take off. >> >> Andrea Shepard (of Tor) and I have been noodling for a little while on a >> different approach, namely federation of *content* via a distributed >> link-based timestamp chain. I need to get a writeup of that together, >> though. >> >> Cheers, >> --mlp > > -- > Get the torrent dynamic blocklist: http://peersm.com/getblocklist > Check the 10 M passwords list: http://peersm.com/findmyass > Anti-spies and private torrents, dynamic blocklist: http://torrent-live.org > Peersm : http://www.peersm.com > torrent-live: https://github.com/Ayms/torrent-live > node-Tor : https://www.github.com/Ayms/node-Tor > GitHub : https://www.github.com/Ayms > _______________________________________________ > p2p-hackers mailing list > [email protected] <javascript:_e(%7B%7D,'cvml','[email protected]');> > http://lists.zooko.com/mailman/listinfo/p2p-hackers _______________________________________________ p2p-hackers mailing list [email protected] <javascript:_e(%7B%7D,'cvml','[email protected]');> http://lists.zooko.com/mailman/listinfo/p2p-hackers Confidentiality notice: This message may contain confidential information. It is intended only for the person to whom it is addressed. If you are not that person, you should not use this message. We request that you notify us by replying to this message, and then delete all copies including any contained in your reply. Thank you. _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
