Wow, that's really, really awesome.  I'm super excited by the potential 
of software-defined radios, and combining that with BGAN is just brilliant.

-david

On 06/14/2011 08:46 AM, Aaron Huslage wrote:
> I've been working on a similar, but safer, system called Tethr.us (as in
> US, not USA) for the past 6 months or so. I'm at the point of looking
> for funding to build a prototype.
>
> It's a satellite modem (BGAN) with OpenBTS, wifi access point and a
> gateway server called Tethr.org. Any piece can be powered off
> individually via the admin UI. It has NO mesh networking and all radios,
> by default, run at ~100mW so they don't travel far enough to be a huge
> security risk. The onboard server provides DTN or sync services so that
> the system is useful if you just connect with a wire and only turn on
> the radios once in a while. On the backend, everything is optionally
> proxied out via TOR (to conserve bandwidth we don't do it on the gateway
> side, but we could).
>
> I've targeted it at journalists who understand the risks of running
> radios in a hostile environment, but anyone can certainly benefit. I
> know the limitations of BGAN and would love to replace it with something
> else, but the ubiquity, battery capacity and antenna size make it suited
> for this sort of work.
>
> If anyone is interested in hearing more, let me know and we can talk
> about it on another thread here or off-list.
>
> On Tue, Jun 14, 2011 at 11:25 AM, Michael Rogers <m...@gmx.com
> <mailto:m...@gmx.com>> wrote:
>
>     On 14/06/11 04:42, Julian Cain wrote:
>      > On Jun 13, 2011, at 8:38 PM, Jan Brittenson <b...@rockgarden.net
>     <mailto:b...@rockgarden.net>>
>      > wrote:
>      >> I think all you need is something that can be turned on at specific
>      >> times, to get a message out.  Then shut it off.   People will have
>      >> their phones on, then all of a sudden they get service, a text
>      >> message or two, after which the service promptly drops again.  A
>      >> station only needs to be on long enough to get the message out.
>      >
>      > ... and to receive the acknowledgement regarding said message.
>
>     Acks may or may not be necessary, depending on the protocol. With a
>     Usenet-style flooding protocol it's sufficient to transmit each message
>     opportunistically to everyone you meet and discard duplicates - no acks
>     are needed.
>
>      >> I think the main challenge is how to prevent a regime from
>      >> hijacking the network.  This will probably require an organized
>      >> structure with isolation, redundancy, a revocation protocol, and
>      >> careful safeguarding at the top.
>
>     Funnily enough I'd argue for the opposite approach - the way to make it
>     robust isn't to safeguard the top, it's to have no top. ;-)
>
>     Imagine a completely distributed publish-subscribe network organised
>     into "channels", where each channel's subscribers flood the channel's
>     messages among themselves using a simple Usenet-like protocol.
>
>     How do we prevent agents of the regime from drowning such a system with
>     spam?
>
>     Solution 1: Restrict who can post to each channel. (For example, by
>     associating each channel with a public/private key pair - subscribers
>     discard any messages that aren't signed with the private key.) That
>     would create a bloggish/twitterish style of interaction where each
>     channel would have one author (or a small group of mutually trusting
>     authors) and an unlimited number of readers.
>
>     Solution 2: Peer moderation. In this model, any subscriber can post
>     signed messages to a channel, but each subscriber will only forward
>     messages signed by authors who that subscriber has manually marked as
>     not being spammers. Thus new authors can't reach a wide audience until
>     they've won the trust of some other subscribers.
>
>     Solution 2 involves more work for subscribers than solution 1, but it
>     allows multi-way discussions, whereas solution 1 could potentially
>     devolve into people shouting past each other. Fortunately both solutions
>     require similar infrastructure, so we can build them both into the same
>     system and see which one people prefer.
>
>      > The number of dissident operated devices need only outweigh a
>      > "regime" in order to protect the network. The same rules apply to
>      > most overlay networks.
>
>     Not really - most P2P and wireless overlays can be jammed by a small
>     number of malicious nodes, including the mesh protocols that have been
>     discussed for these "internet in a suitcase" type ideas.
>
>     Cheers,
>     Michael
>     _______________________________________________
>     p2p-hackers mailing list
>     p2p-hackers@lists.zooko.com <mailto:p2p-hackers@lists.zooko.com>
>     http://lists.zooko.com/mailman/listinfo/p2p-hackers
>
>
>
>
> --
> Aaron Huslage
> http://blog.hact.net
> IM: AIM - ahuslage; Yahoo - ahuslage; MSN - husl...@gmail.com
> <mailto:husl...@gmail.com>; GTalk - husl...@gmail.com
> <mailto:husl...@gmail.com>; Skype - huslage
>
>
>
> _______________________________________________
> p2p-hackers mailing list
> p2p-hackers@lists.zooko.com
> http://lists.zooko.com/mailman/listinfo/p2p-hackers
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to