cleaned up whitespace

This commit is contained in:
reaction.la 2022-06-21 14:37:48 +10:00
parent 9f3309df1e
commit 034983be0b
No known key found for this signature in database
GPG Key ID: 99914792148C8388
7 changed files with 34 additions and 21 deletions

View File

@ -22,4 +22,3 @@
recurse = true
[diff]
submodule = log

View File

@ -269,10 +269,24 @@ For this to work, the underlying structure needs to be something based on
the same principles as Git and git repositories, except that Git relies on
SSL and the Certificate Authority system to locate a repository, which
dangerous centralization would fail under the inevitable attack. It needs to
have instead for its repository name system a distributed name system, but
a Kamelia distributed hash table will come under hostile attack.
have instead for its repository name system a distributed hash table name
system, but a Kamelia distributed hash table will come under hostil
attack.
So rather than a system relying on nearest neighbour by hash distance, nearest neighbour by social distance.
So rather than a system relying on nearest neighbour by hash distance,
nearest neighbour by social distance.
Social distance is costly and complex to calculate. If there are more than
thirty or a hundred entities, need to use dimensional reduction. But we do
not need to do it very often.
Social distance, if calculated in a shill and Sybil resistant way, lacks the
nice mathematical properties of the Kamelia distance metric, so does not
necessarily guarantee you will find what you are looking for. Or if it does, going to be a lot more complicated to prove. But it seems likely that most
of the time, it will perform well, because most of the time you will be
looking for someone close. We will have to find out by experiment.
The reason that Kamelia network cannot work in the face of enemy action, is that the shills who want to prevent something from being found create a hundred entries with a hash close to their target by Kamelia distance, and then when your search brings you close to target, it brings you to a shill, who misdirects you. Using social network distance resists this attack.
The messages of the people you are following are likely to be in a
relatively small number of repositories, even if the total number of