On Sunday, March 25, 2012 David Barrett wrote: > At the end of the day, if the system is sufficiently fair, it's > easier to just play by the rules than try to steal pennies from > your neighbors. Just make the mainline version work great and the > few people who want to get tricky won't upset the broader balance.
Exactly. "Thou shalt not overengineer." Best wishes - S.Osokine. 26 Mar 2012. -----Original Message----- From: p2p-hackers-boun...@lists.zooko.com [mailto:p2p-hackers-boun...@lists.zooko.com] On Behalf Of David Barrett Sent: Sunday, March 25, 2012 5:14 PM To: theory and practice of decentralized computer networks Subject: Re: [p2p-hackers] Distributed filesystem choices (aka: none yet?) On Sun, Mar 25, 2012 at 12:57 PM, Tony Arcieri <tony.arci...@gmail.com> wrote: > You don't get a IOU until you successfully provide storage service for a > period of time (in the Cryptosphere, I said 1 day). This means that as a > provider of storage service, you run the risk of a peer ripping you off and > getting you to provide storage service for them for free, at which point you > have to shrug it off, blacklist them, and never do business with them again. > Like a landlord leasing property, sometimes you have to deal with crappy > tenants, but you can at least try to learn as much as you can from their > reputation before actually trying to do business with them. Though really, I wonder if any of that matters. Even if you *could* build a client that kept resetting its identity and took advantage of whatever "new peer trust" existed, would anybody really bother? I mean, Bittorrent is absolutely vulnerable to the same thing (see BitThief for a working example -- last version released in 2008), but that hasn't stopped it from taking over the world. At the end of the day, if the system is sufficiently fair, it's easier to just play by the rules than try to steal pennies from your neighbors. Just make the mainline version work great and the few people who want to get tricky won't upset the broader balance. -david _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers Confidentiality notice: This message may contain confidential information. It is intended only for the person to whom it is addressed. If you are not that person, you should not use this message. We request that you notify us by replying to this message, and then delete all copies including any contained in your reply. Thank you. _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers