On Friday, January 23, 2015 2:45 AM Michael Rogers wrote: > That's the trouble with this mesh stuff...
Actually that's an interesting story. This FireChat guy went to great pains to describe their network as NON-mesh. Considering that he was not giving any technical details whtsoever and just flatly refused to duscuss security in an open forum, this "negative definition" was the most techical part of his presentation. Basically, he rattled a bunch of mesh network attributes, like dynamic routes, etc - and said that for every such mesh network attribute their network is not a mesh one, since it did not have this particular attribute. (I mean, take this for what it's worth - this statement was rather hard to parse.) Basically, I got an impression that they were doing some kind of message flooding, not bothering with quickly changing dynamic routes. And they did have some congestion control, which was only natural for people that gave us LEDBAT, but still, it was consistent with my guess about flooding - you have to have some congestion control to avoid the meltdown as you scale up, and they had quite a stress test during the Hong Kong protests. But this is just my supposition. The guy looked like he'd just signed about ten NDAs after joining the NSA top secret R&D department. It might be simpler to reverse engineer what they do than to wait for any straight answers. And although he did promise an SDK, there was no ETA, and in any case it was for the loosely related Open Garden robust mesh connectivity product, which they kept developing for a while. Basically, someone slapped a chat app on top of the mesh, and next thing you know, they got more downloads in a week than they got in a previous year. Quite an interesting story, actually. And they do need a bunch of stuff that they have no time to write - encrypted invitation-only chat rooms, etc - so if someone in SF wants an interesing job, that would definitely be a fairly decent place to consider. Best wishes - S.Osokine. 23 Jan 2015. -----Original Message----- From: p2p-hackers [mailto:[email protected]] On Behalf Of Michael Rogers Sent: Friday, January 23, 2015 2:45 AM To: theory and practice of decentralized computer networks Subject: Re: [p2p-hackers] Mesh networks and DoS -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On 22/01/15 20:34, Serguei Osokine wrote: > On Thursday, January 22, 2015 12:03 PM Michael Rogers wrote: >> If you have any information about how FireChat works on Android >> I'd be interested to hear it. > > None whatsoever. Today I hope to attend the FireChat presentation > in Palo Alto: > > https://www.eventbrite.com/e/firechat-from-hong-kong-protests-to-connecting-the-next-5-billion-tickets-15235777621 > > - so whoever is interested is certainly welcome to come and ask > any questions - but I'm afraid that even after that my > understanding will be a bit less clear than what you might require > from the practical standpoint. And I have a suspicion that you > might be a bit too far to come to Palo Alto in six hours. :) That's the trouble with this mesh stuff, it's all based on proximity. :-) Cheers, Michael -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBCAAGBQJUwiY7AAoJEBEET9GfxSfMpUkH/R/TO5Cs8aQGyXZhicGSz1Wk TFg8kILTFHmq1D77lyd5iSx2HMHlVWdI+3/hu2lDSNUa+EB96kEC8pXT+gzv8bQJ ffevLFtXJ8Nzhk965XvEiVHfJcd5ObJvNECWLKjpKU9QZUfdcVn/1GfhrKdu1X0R DeNbdc+VJ3Y/sMtfaH9U0ojcCsYVopCKL7vTRTsH9FVJ3O22y40kXXBtkLtkI/S5 7CZ7BVRc1JzIKtTwhrZZOM1hMA7z2wKwmlbBTcmKQpmiNqpLAatS8XWLvhU/Ed2C VB8yheGIDVk0mXL/grnzBKdDObTLD6mHrhNFIlAMvYz1dmvrpV3W0wcogGj8AlE= =0xTj -----END PGP SIGNATURE----- _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers Confidentiality notice: This message may contain confidential information. It is intended only for the person to whom it is addressed. If you are not that person, you should not use this message. We request that you notify us by replying to this message, and then delete all copies including any contained in your reply. Thank you. _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
