That description sounds like exactly what I have in mind for the
Cryptosphere.

On Thu, Mar 22, 2012 at 4:41 PM, James A. Donald <jam...@echeque.com> wrote:

> On 2012-03-23 4:55 AM, Volodya wrote:
>
>> I don't quite understand. The system must be [anonymous in the sense that
>> the
>> uploader cannot be identified]&&  [have moderation system based on
>> something
>> other than the blocks popularity like in GnuNet/Freenet*]. The system
>> must be
>> [using limited amount of disk space given by its users] and [provide
>> infinite
>> storage guarantee when moderation doesn't apply].
>>
>> I think that the reason why you can't find this filesystem is akin to the
>> reason
>> why all-powerful, all-knowing, and all-good god has not been spotted yet.
>>
>
> Here is a solution:
>
> Everyone is, as with Bitcoin, identified by a public key - but by quite a
> few public keys, providing not anonymity but pseudonymity.
>
> When you store stuff on someone else's system you issue an IOU, which IOU
> is anonymously transferable, using a chaumian protocol, which *does*
> provide anonymity - you pseudonymously store other people's stuff, and
> anonymously use the resulting IOUs to store your own stuff.
>
> From time to time you check that stuff that is stored on someone else's
> system is available by random sampling.
>
> When stuff stored on someone else's system becomes inaccessible, you note
> him as unreliable, and thus decline to issue IOUs or services to him in
> future, though since IOUs are transferable, you are still up for any IOUs
> you have issued to him in the past.
>
> The software attempts to cancel out IOUs - so that if Bob provides
> services to Carol, Carol provides services to Edwards, and Edwards provides
> services to Bob, they cancel out.  If someone's IOUs get cancelled out in a
> cycle of IOUs that include your own, or include those you have confidence
> are reliable, this is evidence he is reliable in that his IOUs are good.
>
> You try to store stuff with those that you have reason to believe are
> reliable, and with those where storing stuff with them enables you to
> cancel out IOUs.
>
> You give low priority to storing stuff from people whose IOUs you have no
> reason to believe.
>
> Repeating: You pseudonymously store other people's stuff, using a nym that
> gains reputation thereby, and anonymously store your stuff on other
> people's systems, using a nym with no reputation.
>
> ______________________________**_________________
> p2p-hackers mailing list
> p2p-hackers@lists.zooko.com
> http://lists.zooko.com/**mailman/listinfo/p2p-hackers<http://lists.zooko.com/mailman/listinfo/p2p-hackers>
>



-- 
Tony Arcieri
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to