Le 17/06/2016 à 06:55, grarpamp a écrit : > On 6/10/16, Mirimir <miri...@riseup.net> wrote: >> But there's still the traffic load. Or maybe, one could consider it as >> chaff. Just sort of, though. Right? > If that's the old "OMG, too much" argument... load re anon overlay nets > may be more like bitcoin's interrelated variables... difficulty, txfees, > reward, > watts, price, txrate, etc... they'll slide nicely around to compensate until > some unsolveable fundamental limit is reached. ie: > Private (non-exit/I2P) use of these nets... if they slow, users will start > talking urging more nodes, which they'll readily deploy themselves since > private is low risk and satiates their use case. If the required node count > to support n-million users starts blowing up CPU/RAM, devs will > start getting poked to work on layering that. Even parallel nets > with usage charters may arise by then as a given networks adversary > resistance begets users begets trust begets honoring narrower charter. > Besides, load happens to useful nets, no point trying to stave it off > (nets are anon so staving is a no anyway), and trying to stave makes > the stavers look stupid. > A little education helps too, users will self regulate if they sense that, > "Oh shit, I know this net is used for <insert activism I like>, but I can't > even get my own <whatever> through, so I better ease up on variable <x>".
Even if an interesting move as you described (ie onions + onioncat) I don't really think that it can scale to the extent required by a bt p2p network, I don't think either that using hidden services is a good solution to reach peers, and is it not an issue to have potentially plenty of new nodes (peers) relaying the Tor traffic and decreasing the efficiency of the Tor circuits due to their upload bandwidth? > > Is it chaff, and good as to filling otherwise quiet parts of the net? > Perhaps. But as in other GPA threads, I think fill traffic may need > to be actively managed to defeat that, rather than just flooded. I don't know, I gave some other thoughts, let's take bitcoin that you quoted, as far as I know it does not have any built-in features to defeat correlation/tracking but apparently inherently defeats it -- Get the torrent dynamic blocklist: http://peersm.com/getblocklist Check the 10 M passwords list: http://peersm.com/findmyass Anti-spies and private torrents, dynamic blocklist: http://torrent-live.org Peersm : http://www.peersm.com torrent-live: https://github.com/Ayms/torrent-live node-Tor : https://www.github.com/Ayms/node-Tor GitHub : https://www.github.com/Ayms -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk