cleaned up whitespace
This commit is contained in:
parent
9f3309df1e
commit
034983be0b
@ -22,4 +22,3 @@
|
||||
recurse = true
|
||||
[diff]
|
||||
submodule = log
|
||||
|
||||
|
@ -269,10 +269,24 @@ For this to work, the underlying structure needs to be something based on
|
||||
the same principles as Git and git repositories, except that Git relies on
|
||||
SSL and the Certificate Authority system to locate a repository, which
|
||||
dangerous centralization would fail under the inevitable attack. It needs to
|
||||
have instead for its repository name system a distributed name system, but
|
||||
a Kamelia distributed hash table will come under hostile attack.
|
||||
have instead for its repository name system a distributed hash table name
|
||||
system, but a Kamelia distributed hash table will come under hostil
|
||||
attack.
|
||||
|
||||
So rather than a system relying on nearest neighbour by hash distance, nearest neighbour by social distance.
|
||||
So rather than a system relying on nearest neighbour by hash distance,
|
||||
nearest neighbour by social distance.
|
||||
|
||||
Social distance is costly and complex to calculate. If there are more than
|
||||
thirty or a hundred entities, need to use dimensional reduction. But we do
|
||||
not need to do it very often.
|
||||
|
||||
Social distance, if calculated in a shill and Sybil resistant way, lacks the
|
||||
nice mathematical properties of the Kamelia distance metric, so does not
|
||||
necessarily guarantee you will find what you are looking for. Or if it does, going to be a lot more complicated to prove. But it seems likely that most
|
||||
of the time, it will perform well, because most of the time you will be
|
||||
looking for someone close. We will have to find out by experiment.
|
||||
|
||||
The reason that Kamelia network cannot work in the face of enemy action, is that the shills who want to prevent something from being found create a hundred entries with a hash close to their target by Kamelia distance, and then when your search brings you close to target, it brings you to a shill, who misdirects you. Using social network distance resists this attack.
|
||||
|
||||
The messages of the people you are following are likely to be in a
|
||||
relatively small number of repositories, even if the total number of
|
||||
|
Loading…
Reference in New Issue
Block a user