TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

This is Fine: Optimism and Emergency in the P2P Network

62 点作者 lftherios将近 5 年前

7 条评论

NortySpock将近 5 年前
I found this struck a chord with me.<p>The key point of the article is that most social P2P systems (Mastodon, Dat) are fully public and do not hide the user&#x27;s data from the system administrator or physical infrastructure network.<p>This is at odds with how these systems are often &quot;marketed&quot; as tools for fighting against The Government&quot; or &quot;The Corporations&quot;-- when the open nature and lack of anonymization mechanisms of these tools expose those who are currently technically breaking the law (to prove a moral point) to be trivially detected by law-enforcement.<p>I personally have considered running a few P2P nodes for fun, but the amount of moderating and administration I would need to do and the risk of the service being used for illegal purposes pushes me firmly in the camp of watching from a distance.
评论 #23890244 未加载
ianopolous将近 5 年前
A decentralized social network should have trust-less servers. The servers should just store encrypted data and serve it up, without being exposed to the social graph and with other metadata minimised.<p>Identity should also be independent of servers (and hence DNS).<p>At the networking layer they will also need to use something like onion routing or a mix network to fully protect the social graph.
评论 #23918750 未加载
black_puppydog将近 5 年前
This takes a while to digest. I&#x27;ve been hanging out on SSB (aka scuttlebutt) for a while now and I do enjoy the community. So this hits very close to home, and I guess it&#x27;s good that it does.<p>The author, one the one hand, writes this in the concluding paragraph:<p>&gt; Without cohesive organisation, mobilisation to harden security and privacy and without a sincere commitment from protocol designers to revise their collective assumptions, the push back from incumbent power will leverage each and every socio-technical flaw in each and every network.<p>But on the other hand they write:<p>&gt; The moment demands not another protocol, not another manifesto, not another social network, but a savvy understanding of the political dynamics of protocols and the nakedness of today’s networks.<p>I guess that&#x27;s a call for doing some serious stock-taking before writing the next (iteration of an existing) protocol? I&#x27;m fairly confident that the &quot;solution&quot; to this, if it is to be found, will have <i>some</i> technological component to it. But Cade Diehm is right in pointing out that that will not suffice, not by a long shot.<p>If we expect every (human-made) protocol to have flaws and vectors for &quot;incumbent retaliation&quot; like the bittorrent copyright suits of the 00s, then <i>one</i> way to side-step this would be to reduce the harm such tactics can do. Not saying that&#x27;s easy, but establishing the social norm that copyright records won&#x27;t get you into trouble when trying to find a job, that would be cool. There&#x27;s a whole cultural aspect to this that has largely been confined to some niche cyberpunk (and even more niche, and frankly artistically lacking) solarpunk subcultures.<p>So where do we go from here? Do we &quot;simply&quot; design protocols and networks around them that don&#x27;t allow siphoning off the entire traffic? Do we establish spaces (physical, mostly) where being &quot;burned&quot; by a copyright lawsuit won&#x27;t matter, going full walkaway (look it up if you don&#x27;t get the reference) or what should happen?
评论 #23891677 未加载
评论 #23892481 未加载
iampims将近 5 年前
I wish the article linked to p2p protocols that were designed with privacy in mind.
评论 #23890283 未加载
评论 #23892466 未加载
评论 #23893265 未加载
评论 #23892490 未加载
评论 #23894122 未加载
评论 #23891533 未加载
heckerhut将近 5 年前
Wow, rarely seen such good writing on this topic. Encouraging to see that these ideas are well and alive and kept available until the impossible suddenly becomes possible.
ximm将近 5 年前
AFAIK peer-to-peer is about preventing censorship, but the author seems to assume it is about preventing surveillance. So a large part of the criticism is missing the point.<p>Still, it is a problem that these systems are not preventing both and it is also a problem if users expect the latter but only get the former. Protocols need to be specific about their threat model.
Lammy将近 5 年前
Nit: The background-color style on `.lyt-txt label` makes this very difficult to read for me: <a href="https:&#x2F;&#x2F;i.imgur.com&#x2F;XYIH36q.png" rel="nofollow">https:&#x2F;&#x2F;i.imgur.com&#x2F;XYIH36q.png</a>