[p2p-hackers] Pirate Pay

James A. Donald jamesd at echeque.com
Mon May 14 15:48:16 PDT 2012


On 2012-05-14 6:01 PM, Daniel Reusche wrote:
> This is why we are improving our blacklists and trust models. I think
> BitTorrent is an ideal testing field for a karma based economy.

Bittorrent's notorious problem is that it does not remember anything from 
one torrent to the next, and does not share graph or karma data from on 
peer to the next, because managing shared graph data is tricky, and 
managing shared karma data is a great deal trickier.

This results in lack of incentive to seed, with the result that the vast  
majority of torrents are unseeded.  Torrents die.

To fix this problem, people tend to form associations based on a  
particular web site.  The association rewards and penalizes people  
according to their upload download ratio, which is the wrong metric. The 
important metric is keeping approved torrents alive, the important metric 
is storage availability rather than bandwidth, though bandwidth matters 
also.

The association has a central point of failure, its website and its  
operators, who come under pressure.  One needs a distributed system that  
gives people incentives to seed - that rewards people for providing other 
people storage and availability.

Some design characteristics:

*.  Peers are identified by a durable public key.

*.  Peers interact with keys they do not trust, but expect protocol  
conformance and prosocial behavior only from keys they trust. Peers limit 
their exposure to non trusted keys so that they can suffer only limited 
damage from non trusted keys deviating from protocol or otherwise 
misbehaving.

*.  Peers may not only trust Bob, but transitively everyone Bob trusts,  
and everyone that those peers trust ...  If this works, they increase  
their transitive trust in Bob, if it fails they decrease their transitive 
trust.

*.  Prosocial behavior consists of conforming to protocol, storage  
availability, with valuable, or at least demanded, stuff in storage and  
accessible on demand,  and paying ones bandwidth and storage debts. Since 
networks are unreliable, perfect protocol conformity is never expected or 
demanded, but the burden that one's deviations from protocol place on other 
peers counts against one's karma.

Thus Bob performs the functions of the website in a bittorrent association 
- thus every well behaved peer performs the function of the website in a 
bittorrent association.
_______________________________________________
p2p-hackers mailing list
p2p-hackers at lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

----- End forwarded message -----
-- 
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE





More information about the cypherpunks-legacy mailing list