Alas, we're talking in dream land. None of this really exists in a workable state (so far as I know). Sorry!
-david On 02/04/2011 01:03 PM, Andrew Lewis wrote: > Hey, > > > Came across this as I was looking into something similar with the folks at > telecomix, the group that has been providing dialup access/VPNs to the > protestors. I like the idea, and want to follow along, but have a few > questions. > > > What are you guys doing for internode communications and from there onto the > world? > > I saw mention of flashing routers, alongside LiveCDs, I think that routers > might be a bit much, but LiveCDs seem like a easier way to create nodes on > the network. > > What protocols are you looking at running on top of the network? Email? Chat? > Filesharing? > > > Thanks, > Andrew > > On Feb 4, 2011, at 2:37 PM, David Barrett wrote: > >> On 02/04/2011 12:02 PM, Serguei Osokine wrote: >>> http://blog.quinthar.com/2011/01/how-piracy-will-hyperlocalize-with-mesh.html >>> >>> - albeit with software radio instead of the existing wi-fi hardware. >>> >>> So David, since this mesh hyperlocalization was your own idea, I'm >>> not sure - why would you suggest that ther's no compelling value in >>> mesh networks, even with normally functioning Internet? Except for >>> this pesky ubiquitous wi-fi encryption, of course... >> >> I'm pro-mesh for local activity. Piracy is best done locally (for both >> performance *and* security reasons) so is best done over a mesh. In >> other words, mesh piracy can be *better* than internet piracy. >> >> Global communication, on the other hand, is best done with the internet. >> Mesh communication is *worse* than internet communication, at least >> over large distances. >> >> Ultimately, we should use the best tool for the job. The internet is >> really frickin' good; we should use it whenever it's available and >> preferable. >> >> That's true for piracy *and* communication: neither can get mass >> adoption without seamless internet compatibility. A pirate mesh needs >> to fall back on the internet when it can't find content locally, and the >> communication network should only fall back to the mesh when it can't >> communicate globally. >> >> -david >> >> >> >> >>> >>> Best wishes - >>> S.Osokine. >>> 4 Feb 2011. >>> >>> >>> >>> -----Original Message----- >>> From: p2p-hackers-boun...@lists.zooko.com >>> [mailto:p2p-hackers-boun...@lists.zooko.com] On Behalf Of Alen Peacock >>> Sent: Friday, February 04, 2011 10:55 AM >>> To: theory and practice of decentralized computer networks >>> Subject: Re: [p2p-hackers] What we should build for the Egyptian (and >>> other) protesters >>> >>> I'd always hoped that a global ad-hoc wireless network would spring >>> from something like MIT's RoofNet >>> (http://pdos.csail.mit.edu/roofnet/doku.php). >>> >>> There's still a lot of academic research into ad-hoc networks, but I'm >>> not aware of anyone really pursuing something like this in the >>> commercial space -- anyone been following closer than me? >>> >>> Alen >>> >>> >>> On Fri, Feb 4, 2011 at 11:49 AM, Serguei Osokine >>> <serguei.osok...@efi.com> wrote: >>>> On Friday, February 04, 2011 wrote: >>>>> The only way something like this will take off is if it provides >>>>> some *very* compelling value even when the internet is functioning >>>>> normally. >>>> >>>> Two things that spring to mind first are CB-like (as in "CB radio") >>>> anonymous contacts with people who are in the vicinity, and the p2p >>>> traffic anonymization through local relay chains. 802.11 typically >>>> has plenty of spare bandwitdth, being much faster than your normal >>>> ISP broadband link, so you can have, say, five-hop relays without >>>> any service quality degradation whatsoever. Kind of like local Tor, >>>> except that in 802.11 space you're not paying for forwarding traffic >>>> with your own service quality, and tracking the ad-hoc MAC-address >>>> routing is pretty challenging for an adversary. >>>> >>>> Of course, 802.11 traffic is routinely encrypted these days, so that >>>> might be a bit of a challenge - but this challenge is present in any >>>> ad-hoc scenario. >>>> >>>> Best wishes - >>>> S.Osokine. >>>> 4 Feb 2011. >>>> >>>> >>>> -----Original Message----- >>>> From: p2p-hackers-boun...@lists.zooko.com >>>> [mailto:p2p-hackers-boun...@lists.zooko.com] On Behalf Of David Barrett >>>> Sent: Friday, February 04, 2011 9:12 AM >>>> To: theory and practice of decentralized computer networks >>>> Subject: Re: [p2p-hackers] What we should build for the Egyptian (and >>>> other) protesters >>>> >>>> On 02/04/2011 08:58 AM, Julian Cain wrote: >>>>> >>>>> This is false. Egypt cut ALL Internet traffic including mobile. Having >>>>> said this the only solution is an AD-HOC network built with existing >>>>> hardware w/ internet gateways somewhere along the path. This technology >>>>> has been around for quite some time. The downside is that it takes an >>>>> incredible amount of effort to daisy chain home and office routers in a >>>>> manner that will "act" like the Internet. This is the only solution to a >>>>> complete government/corporate takeover. Build a new Internet with >>>>> existing hardware that gateways users into the public Internet. >>>> >>>> Just to clarify, did Egypt cut *domestic* phone and internet, or just >>>> *international*? For example, if I had a server inside Egypt, using an >>>> Egyptian domain, could users inside Egypt generally access it? >>>> >>>> >>>>> Most home routers can perform this either by extending the network or >>>>> bridging networks. >>>> >>>> The only way something like this will take off is if it provides some >>>> *very* compelling value even when the internet is functioning normally. >>>> Otherwise it'll always be relegated to being a tiny fringe project. >>>> >>>> >>>> I think a better approach is to prepare a system that uses the internet >>>> when it's available (as it almost always is), but then offers to set up >>>> a DHT or even, ad hoc mesh network -- or even a "sneakernet" -- if it >>>> detects the internet has stopped functioning. >>>> >>>> For example, imagine that everybody's mobile Twitter device, upon >>>> discovering a loss of connection to twitter.com, offered to connect to >>>> the "BlueTooth mesh". In high-density environments like a protest, I >>>> imagine it could actually work. Then all the laptops that had domestic >>>> internet access establish a DHT (perhaps they quietly had it established >>>> all along) and bridge the various bluetooth meshes that have sprung up >>>> around the nation. And at that time also mention that it can just >>>> "manually synchronize" using a USB keydrive or MP3 player. >>>> >>>> But all this needs to be kept quiet, totally automated, and entirely >>>> unobtrusive in normal operation; it can't bother people to even consider >>>> these options when the internet is available, because the internet is so >>>> much more convenient to use. Nobody will care about any of these >>>> features, and they'll be an active *demerit* to the application that >>>> *reduces* its adoption -- up until everybody absolutely depends on them. >>>> >>>> -david >>>> _______________________________________________ >>>> p2p-hackers mailing list >>>> p2p-hackers@lists.zooko.com >>>> http://lists.zooko.com/mailman/listinfo/p2p-hackers >>>> >>>> Confidentiality notice: This message may contain confidential >>>> information. It is intended only for the person to whom it is addressed. >>>> If you are not that person, you should not use this message. We request >>>> that you notify us by replying to this message, and then delete all copies >>>> including any contained in your reply. Thank you. >>>> _______________________________________________ >>>> p2p-hackers mailing list >>>> p2p-hackers@lists.zooko.com >>>> http://lists.zooko.com/mailman/listinfo/p2p-hackers >>>> >>> _______________________________________________ >>> p2p-hackers mailing list >>> p2p-hackers@lists.zooko.com >>> http://lists.zooko.com/mailman/listinfo/p2p-hackers >>> >>> Confidentiality notice: This message may contain confidential information. >>> It is intended only for the person to whom it is addressed. If you are not >>> that person, you should not use this message. We request that you notify >>> us by replying to this message, and then delete all copies including any >>> contained in your reply. Thank you. >>> _______________________________________________ >>> p2p-hackers mailing list >>> p2p-hackers@lists.zooko.com >>> http://lists.zooko.com/mailman/listinfo/p2p-hackers >> _______________________________________________ >> p2p-hackers mailing list >> p2p-hackers@lists.zooko.com >> http://lists.zooko.com/mailman/listinfo/p2p-hackers > > _______________________________________________ > p2p-hackers mailing list > p2p-hackers@lists.zooko.com > http://lists.zooko.com/mailman/listinfo/p2p-hackers _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers