[draft] Defeating Botnets and Trojans: Episode 1

Nico Verrijdt nicoverrijdt at gmail.com
Sat Jun 11 00:37:26 PDT 2022


The purpose of my life is spitting out ideas, the one less probable then
the other, and people who own the network,
and my computer, use (or steal ymmv) what can be used. Normally I don't
write to mailing lists, I'm just a lurker,
but this had to be said. Normally I just write my ideas in the title bar of
file explorer and I don't save them.
My schizophrenic and naive mind does compare to a 12 year old ... but I
love it still having imagination and creativity.
Basic assumptions are wild imho, you easily overlook something.

Op vr 10 jun. 2022 om 18:15 schreef enlight <enlight at riseup.net>:

> you sound like a 12 year old,  with naive imaginations.  If you have
> studied computer science in college,
> generally in any computer system, there are some basic assumptions and we
> build our foundations on that.
>
> ------ Original Message ------
> From "Nico Verrijdt" <nicoverrijdt at gmail.com>
> To "Karl Semich" <0xloem at gmail.com>; cypherpunks at lists.cpunks.org
> Date 07/06/2022 13:53:38
> Subject Re: [draft] Defeating Botnets and Trojans: Episode 1
>
> Imho the operating systems we use aren't adequate.
>
> No single user is 100% accountable for what he/she does on the network.
>
> I'm not an expert in this field at all, but I thought about this quite a
> lot figuring things out.
>
> Here it goes:
> Suppose you implement a blockchain for identities as early in the boot
> process as possible, then you find the public key of every user in the
> blockchain and can communicate with every user while that user knows you
> are connected to him/her.
> Now you have a blockchain and can connect to virtually anyone.
> But the operating system is still vulnerable to hijacking and you should
> verify correctness somehow. Suppose, I'm really not sure if this
> effectively works, you implement a hashing function as early as possible in
> the compiler, then you can hash the code of the compiler and verify if the
> compiler's code changed. Then up to the operating system which you compile
> with that compiler and hash the code in its development stages. Now you're
> able to connect other users in the network and compare hashes of comparable
> computer systems. Maybe there are better alternatives. What happens in
> memory is a black box to me, somehow I like to hash and compare that too,
> and I understand that our computers become quite a lot slower.
>
> Privacy issues do arise with this system, but it's nothing more than in
> real life where you meet someone and say 'Hi, I'm ...', politeness,
> naivety, in this world now where the internet is totally different, not
> moral indeed.
> And also, the internet is free, with such a system an internet with
> different speeds might be more easily made as every user is known within a
> certain time span.
>
> I'm currently working on a blockchain of identities (
> https://github.com/nvrrdt/onzecurrency) and I'd like to continue
> developing
> this, so I hope the concept has a chance to succeed in its endeavor.
>
> Op di 7 jun. 2022 om 10:20 schreef Nico Verrijdt <nicoverrijdt at gmail.com>:
>
>
> Imho the operating systems we use aren't adequate.
>
> No single user is 100% accountable for what he/she does on the network.
>
> I'm not an expert in this field at all, but I thought about this quite a
> lot figuring things out.
>
> Here it goes:
> Suppose you implement a blockchain for identities as early in the boot
> process as possible, then you find the public key of every user in the
> blockchain and can communicate with every user while that user knows you
> are connected to him/her.
> Now you have a blockchain and can connect to virtually anyone.
> But the operating system is still vulnerable to hijacking and you should
> verify correctness somehow. Suppose, I'm really not sure if this
> effectively works, you implement a hashing function as early as possible in
> the compiler, then you can hash the code of the compiler and verify if the
> compiler's code changed. Then up to the operating system which you compile
> with that compiler and hash the code in its development stages. Now you're
> able to connect other users in the network and compare hashes of comparable
> computer systems. Maybe there are better alternatives. What happens in
> memory is a black box to me, somehow I like to hash and compare that too,
> and I understand that our computers become quite a lot slower.
>
> Privacy issues do arise with this system, but it's nothing more than in
> real life where you meet someone and say 'Hi, I'm ...', politeness,
> naivety, in this world now where the internet is totally different, not
> moral indeed.
> And also, the internet is free, with such a system an internet with
> different speeds might be more easily made as every user is known within a
> certain time span.
>
> I'm currently working on a blockchain of identities (
> https://github.com/nvrrdt/onzecurrency) and I'd like to continue
> developing this, so I hope the concept has a chance to succeed in its
> endeavor.
>
> Op di 7 jun. 2022 om 09:22 schreef Karl Semich <0xloem at gmail.com>:
>
>
> Cypherpunks, Anarchists, and Security Professionals can agree on
> something. Something we have agreed on for a long time, but fought
> viciously over.
>
> We need uses of computer networks to be moral.
>
> Our communities have been attacked for quite some time now.
>
>
>
>
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 7519 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20220611/b00aa92f/attachment.txt>


More information about the cypherpunks mailing list