On Jun 13, 2011, at 8:38 PM, Jan Brittenson <b...@rockgarden.net> wrote:

> 
> On Jun 12, 2011, at 5:26 PM, David Barrett wrote:
> 
>> 
>> For example, assuming we already had some sort of mesh network 
>> capability (via wifi or bluetooth or whatever), perhaps have nodes 
>> synchronize their clocks such that they only agree to send/receive 
>> according to some psuedorandom intervals?  Even more interesting if it 
>> combined GPS such that the broadcast periods could be derived from 
>> actual physical location.  So two nodes that have never communicated but 
>> know some shared secret (eg, a password) could check their positions and 
>> figure out "I don't know if anybody is around me, but if there *is*, 
>> they'll be online for 60s at 5:23pm."
>> 
> 
> I think all you need is something that can be turned on at specific times, to 
> get a message
> out.  Then shut it off.   People will have their phones on, then all of a 
> sudden they get service, a
> text message or two, after which the service promptly drops again.  A station 
> only needs to be
> on long enough to get the message out.  

... and to receive the acknowledgement regarding said message.

> A small portable unit could be in a car or on a roof,
> or it could sit next to your table in a bag as you sit and drink or eat.  Or 
> while you walk down the
> street.  I don't think broadcasts need to be scheduled; simply turn it on 
> when you have
> something to forward.
> 
> So it's about creating a simple, cheap, lightweight station that can look 
> like a 'real' mobile
> network, allowing phones to connect and that can send text messages.  To 
> distribute a message
> to a large number of people you'd have a topology where operators receive 
> messages like
> anyone else and propagate it.  It doesn't seem anything terribly complicated 
> is needed, or
> even desirable.
> 
> I think the main challenge is how to prevent a regime from hijacking the 
> network.  This will
> probably require an organized structure with isolation, redundancy, a 
> revocation protocol,
> and careful safeguarding at the top.  

The number of dissident operated devices need only outweigh a "regime" in order 
to protect the network. The same rules apply to most overlay networks.

> For instance, if operator A propagates messages from
> B or C, then B or C might be redundant.  If C0 is compromised C1 is 
> activates, and starts by
> notifying A of the compromise.  (C2 is then activated if C1 is compromised.)  
> Some sort of
> cryptographic protection is probably necessary to prevent regimes from simply 
> creating their
> own stations.
> 
> But I think security is a pretty minor point - just getting messages out 
> while making everyone
> aware of the possibility of compromise is probably good enough.
> 
> _______________________________________________
> p2p-hackers mailing list
> p2p-hackers@lists.zooko.com
> http://lists.zooko.com/mailman/listinfo/p2p-hackers
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to