On 01/17/2011 10:06 PM, Michael Blizek wrote:
>>> Something like the above *will* happen. It's inevitable. It's not even
>>> that creative. And it'll probably happen sooner than we expect. Sound
>>> unlikely? Remember those researchers that cracked GSM at the CCC 2
>>> weeks ago? They did it with "Universal Software Radio Peripheral"
>>
>> Sounds funny... just where did you get *that* idea from?
>
> Thee are other projects doing this as well:
> gnunet.org is building a transport as it can act as a mesh
> netsukuku.freaknet.org is building a file sharing mesh network, but I doubt it
>    will scale very well

I think the key question, as has always been the question when it comes 
to P2P network, is usability.  Skype "just worked" so well that it took 
off like mad.  Same for the major pirate networks (though even those are 
surprisingly unwieldy).  A wireless mesh will only take off if it's 
absolutely dead simple.  In fact... I could see it leveraging some of 
SocialVPN and the P2P social network concepts.  Imagine:

1) You buy this USB device from WalMart, and plug it in for the first time.

2) An app launches, whether you're on Mac, Windows, Linux, iPad, whatever.

3) It asks "Welcome to the Mesh!  Do you have an account, or do you want 
to create a new one?"  You choose "Create a new one, named Quinthar"; it 
generates a huge public key.

4) It asks "There are 23 nodes in range named Alice, Bob, Cathy, etc. 
Which are your friends?"  You choose "Alice".

5) It shows you Alice's public profile, which is available to anyone. 
It's up to Alice to decide how much to show.  It asks "What password 
would you like to use to friend Alice?"  You say "Wonderland"

6) On Alice's computer it says "Quinthar would like to be friends, what 
is the password?"  She asks you, then types it in "Wonderland".  It says 
"Great, now you and Alice are friends, and will stay connected so long 
as you are directly in range, share an intermediate mesh node, or are 
both connected to the internet." [Eg, it works just like SocialVPN and 
if it can't directly connect, establishes a NAT-penetrated connection 
over the internet.  After the initial setup, you never need to think 
about it again.]

6) Once connected, you can see Alice's "Friend" profile, which is shown 
to anybody who is friends Alice.  It might have additional information, 
such as online status, more photos and such, as she chooses.  She sees 
the same for you.

7) It says "Now that you're friends with Alice, what do you want to do?" 
  You say "Share these songs, photos, and videos, but not these other 
ones." [Perhaps by folder.]  When she looks at your profile, she sees 
all these items.  She can set offline preferences to optionally sync 
your data to her computer for access if you get separated.  You might 
have a variety of access levels that you choose to share or not with 
different people.

8) It says "Great, it's shared with Alice.  Do you want to share with 
any of Alice's friends -- including those you don't know?"  You directly 
set how many levels of indirection you'll allow, perhaps just defaulting 
to 3 (Alice, Alice's friends, Alice's friends friends.)

... fast forward until you have many connections, some of which are 
physically in range, others are connected via a VPN over the internet, 
others are offline ...

9) You have a vast interface to browse the photos, videos, songs, 
updates, profile information, and basically a lot of stuff about 
everybody around you.  The USB dongle is used to install on a new 
computer, and connect directly without the internet, but even without 
the dongle an installed computer can continue to participate in the mesh 
via the internet.

10) If any particular computer gets lost or compromised, you can 
unfriend them (or remove just that device) immediately.  Furthermore, 
your node is configured to monitor unfriending to automatically 
"quarantine" any node that has become suspect.  (For example, one of my 
friends lost his iPhone; he'd remove that device from his profile and my 
devices would stop talking with it, without any involvement from me.)

11) And because your USB dongle is owned by you, it can store data such 
as your private key so you can easily move it between computers -- or 
even quickly access your mesh using someone else's computer, without 
leaving any trace on the computer itself.


Anyway, ultimately I think mesh technology will be far less important 
than mesh *usability*.  It needs to be packaged up with really simple, 
excellent software that enables the most basic peer activities -- 
especially file transfer -- to be done in a totally seamless way

-david
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to