On Sunday, March 25, 2012 David Barrett wrote:
> At the end of the day, if the system is sufficiently fair, it's
> easier to just play by the rules than try to steal pennies from
> your neighbors.  Just make the mainline version work great and the
> few people who want to get tricky won't upset the broader balance.

Exactly.

"Thou shalt not overengineer."

Best wishes -
S.Osokine.
26 Mar 2012.


-----Original Message-----
From: p2p-hackers-boun...@lists.zooko.com 
[mailto:p2p-hackers-boun...@lists.zooko.com] On Behalf Of David Barrett
Sent: Sunday, March 25, 2012 5:14 PM
To: theory and practice of decentralized computer networks
Subject: Re: [p2p-hackers] Distributed filesystem choices (aka: none yet?)

On Sun, Mar 25, 2012 at 12:57 PM, Tony Arcieri <tony.arci...@gmail.com> wrote:
> You don't get a IOU until you successfully provide storage service for a
> period of time (in the Cryptosphere, I said 1 day). This means that as a
> provider of storage service, you run the risk of a peer ripping you off and
> getting you to provide storage service for them for free, at which point you
> have to shrug it off, blacklist them, and never do business with them again.
> Like a landlord leasing property, sometimes you have to deal with crappy
> tenants, but you can at least try to learn as much as you can from their
> reputation before actually trying to do business with them.

Though really, I wonder if any of that matters.  Even if you *could*
build a client that kept resetting its identity and took advantage of
whatever "new peer trust" existed, would anybody really bother?  I
mean, Bittorrent is absolutely vulnerable to the same thing (see
BitThief for a working example -- last version released in 2008), but
that hasn't stopped it from taking over the world.

At the end of the day, if the system is sufficiently fair, it's easier
to just play by the rules than try to steal pennies from your
neighbors.  Just make the mainline version work great and the few
people who want to get tricky won't upset the broader balance.

-david
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Confidentiality notice:  This message may contain confidential information.  It 
is intended only for the person to whom it is addressed. If you are not that 
person, you should not use this message.  We request that you notify us by 
replying to this message, and then delete all copies including any contained in 
your reply.  Thank you.
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to