
On 02/12/05, zooko@zooko.com <zooko@zooko.com> wrote:
Let 1 be the set of networks which are used for illegal transmission of information,
I do wish you would refer to these networks as those which allow the covert transmission of information, rather than those which are used for the illegal transmission of information - since I am not aware of any networks that are specifically designed for the illegal transmission of information. I think this would help alleviate the political problem you raise later in your email.
If you broaden your definition of set 1 to be networks which are used for the covert transmission of information (I think this is a more useful definition for the set as not all covert activity is illegal), then I am not sure, in practice, how many networks will fall into set 2 that aren't also members of set 1, in fact, I can't think of any non-contrived situations where one would create a f2f network motivated by something other than a desire to be covert in some way.
[bepw2002] introduces "darknet" to mean concept 1.
I'm not going to spend time dissecting their paper to determine exactly what BEPW's intention was for the term "darknet", certainly they could have been much more explicit about this if they wanted to, and they use the term in contradictory ways throughout their paper. For example, they refer to "the darknet" as if there is only one, but subsequenly refer to "darknets". Given this vagueness, I can't imagine that is was their goal to provide an authorative definition for the term. While we can debate what BEPW intended the term to mean when they used it in their paper, this is ultimately irrelevant. Software engineers often seem to forget that English isn't like a programming language where a designer specifies an unambigous definition at the outset (Richard Stallman is particularly guilty of this). The meaning of words in English is a consensus that is arrived at over time, and eventually finds its way into a dictionary (long) after that consensus is stable. The BEPW paper is one early voice in that consensus-forming process. Mine is another, yours is another still.
I am not sure that they were a direct inspiration. We (Freenet) have been concerned about the fact that Freenet was harvestable for several years now. Around spring this year I made the observation that if human relationships form a small world network, it should be possible to assign locations to people such that we form a Kleinberg-style small world network, and thus we could make the network routable. Oskar Sandberg then suggested a way to do this, and we set about validating the concept using simulations.
I think a much better way to avoid this nasty political consequence is to stop describing set 1 in terms of illegal activity, but rather describe such networks as being "covert", or "anonymity preserving" - neither of which implies illegal activity (it is perfectly legal to be anonymous in most countries whose legal systems I am familiar with).
That's an interesting remark -- that you regard concealment as one of the
Or just 2, since I think the sets 1^2 and 2 are, in practical terms, virtually identical. main
That is surprising. Are you aware of any current or proposed f2f networks for which concealment of user activity is not a goal? Ian. _______________________________________________ p2p-hackers mailing list p2p-hackers@zgp.org http://zgp.org/mailman/listinfo/p2p-hackers _______________________________________________ Here is a web page listing P2P Conferences: http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
participants (1)
-
Ian Clarke