I'd always hoped that a global ad-hoc wireless network would spring from something like MIT's RoofNet (http://pdos.csail.mit.edu/roofnet/doku.php).
There's still a lot of academic research into ad-hoc networks, but I'm not aware of anyone really pursuing something like this in the commercial space -- anyone been following closer than me? Alen On Fri, Feb 4, 2011 at 11:49 AM, Serguei Osokine <serguei.osok...@efi.com> wrote: > On Friday, February 04, 2011 wrote: >> The only way something like this will take off is if it provides >> some *very* compelling value even when the internet is functioning >> normally. > > Two things that spring to mind first are CB-like (as in "CB radio") > anonymous contacts with people who are in the vicinity, and the p2p > traffic anonymization through local relay chains. 802.11 typically > has plenty of spare bandwitdth, being much faster than your normal > ISP broadband link, so you can have, say, five-hop relays without > any service quality degradation whatsoever. Kind of like local Tor, > except that in 802.11 space you're not paying for forwarding traffic > with your own service quality, and tracking the ad-hoc MAC-address > routing is pretty challenging for an adversary. > > Of course, 802.11 traffic is routinely encrypted these days, so that > might be a bit of a challenge - but this challenge is present in any > ad-hoc scenario. > > Best wishes - > S.Osokine. > 4 Feb 2011. > > > -----Original Message----- > From: p2p-hackers-boun...@lists.zooko.com > [mailto:p2p-hackers-boun...@lists.zooko.com] On Behalf Of David Barrett > Sent: Friday, February 04, 2011 9:12 AM > To: theory and practice of decentralized computer networks > Subject: Re: [p2p-hackers] What we should build for the Egyptian (and other) > protesters > > On 02/04/2011 08:58 AM, Julian Cain wrote: >> >> This is false. Egypt cut ALL Internet traffic including mobile. Having said >> this the only solution is an AD-HOC network built with existing hardware w/ >> internet gateways somewhere along the path. This technology has been around >> for quite some time. The downside is that it takes an incredible amount of >> effort to daisy chain home and office routers in a manner that will "act" >> like the Internet. This is the only solution to a complete >> government/corporate takeover. Build a new Internet with existing hardware >> that gateways users into the public Internet. > > Just to clarify, did Egypt cut *domestic* phone and internet, or just > *international*? For example, if I had a server inside Egypt, using an > Egyptian domain, could users inside Egypt generally access it? > > >> Most home routers can perform this either by extending the network or >> bridging networks. > > The only way something like this will take off is if it provides some > *very* compelling value even when the internet is functioning normally. > Otherwise it'll always be relegated to being a tiny fringe project. > > > I think a better approach is to prepare a system that uses the internet > when it's available (as it almost always is), but then offers to set up > a DHT or even, ad hoc mesh network -- or even a "sneakernet" -- if it > detects the internet has stopped functioning. > > For example, imagine that everybody's mobile Twitter device, upon > discovering a loss of connection to twitter.com, offered to connect to > the "BlueTooth mesh". In high-density environments like a protest, I > imagine it could actually work. Then all the laptops that had domestic > internet access establish a DHT (perhaps they quietly had it established > all along) and bridge the various bluetooth meshes that have sprung up > around the nation. And at that time also mention that it can just > "manually synchronize" using a USB keydrive or MP3 player. > > But all this needs to be kept quiet, totally automated, and entirely > unobtrusive in normal operation; it can't bother people to even consider > these options when the internet is available, because the internet is so > much more convenient to use. Nobody will care about any of these > features, and they'll be an active *demerit* to the application that > *reduces* its adoption -- up until everybody absolutely depends on them. > > -david > _______________________________________________ > p2p-hackers mailing list > p2p-hackers@lists.zooko.com > http://lists.zooko.com/mailman/listinfo/p2p-hackers > > Confidentiality notice: This message may contain confidential information. > It is intended only for the person to whom it is addressed. If you are not > that person, you should not use this message. We request that you notify us > by replying to this message, and then delete all copies including any > contained in your reply. Thank you. > _______________________________________________ > p2p-hackers mailing list > p2p-hackers@lists.zooko.com > http://lists.zooko.com/mailman/listinfo/p2p-hackers > _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers