Cryptocurrency:

Karl gmkarl at gmail.com
Sat Jun 6 04:38:36 PDT 2020


On Sat, Jun 6, 2020, 7:18 AM other.arkitech <other.arkitech at protonmail.com>
wrote:

>
>
>
> Sent with ProtonMail <https://protonmail.com> Secure Email.
>
> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
> On Saturday, June 6, 2020 10:17 AM, Karl <gmkarl at gmail.com> wrote:
>
>
>
> On Fri, Jun 5, 2020, 7:29 PM other.arkitech <other.arkitech at protonmail.com>
> wrote:
>
>> > so your system doesn't have a bloated chain, which is nice. The
>> 'consensus' is handled by voting...based one IP address one vote. But how
>> robust is relying on IP addresses at the end of the day?
>> >
>>
>> IPv4 provides unique features no other protocol has. address space is
>> saturated (scarce) and addresses are not cheap. It is a a nice tool for
>> Sybil control
>>
>
> OA, when you say this people start disregarding what you say because it is
> false.
>
> Any software developer can get thousands of IP addresses by altering a
> piece of pirated software to include something new of their own design and
> sharing it in a venue where it hasn't been shared on before.  There are
> many many other ways and people _think_ of them, _use_ them, are _observed_
> using them, and things spread and grow.
>
>
> what? any developer geting thousands of public IPv4 addresses by modifying
> software?
> Nop. That's not true.
> (Or I haven't understood well what you say)
>

People go to places on the internet to download things.  Others can upload
things to those places to download.  You can upload something that lies
about what it is doing, and gives you use of the ip address of the
downloader's computer when run.  Do you understand?

It sounds like this is surprising to you?

>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 3011 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20200606/0313f07d/attachment.txt>


More information about the cypherpunks mailing list