EFTA00822807.pdf

DataSet-9 3 pages 846 words document
👁 1 💬 0
📄 Extracted Text (846 words)
From: "Jeffrey E." <[email protected]> To: Jeremy Rubin cal > Subject: Fwd: Date: Sat, 30 Jul 2016 12:43:42 +0000 i agree with danny , just like bitcoin or other digital currencies. I think the land of binary decision . its either this or that, now usually leads to the answer " both" Forwarded message From: Danny Hillis Date: Sat, Jul 30, 2016 at 8:33 AM Subject: Re: To: "jeffrey E." <[email protected]> The two properties that the Internet lacks are guaranteed quality of service (bandwidth and latency) and the ability to know for sure where a packet originated. These two features are fundamentally incompatible with the design of the Internet and they trade off against other features. For instance the second network I have in mind may well be inferior to the Internet in efficiency of utilization of the resources , so it will cost more per bit to send a message. It will probably be worse the than the Internet in supporting anonymity. So it it not a replacement for the Internet, but a complement to it. On Fri, Jul 29, 2016 at 9:58 PM, jeffrey E. <[email protected]> wrote: Forwarded messa e From: Jeremy Rubin Date: Thu, Jul 28, 2016 at 9:51 AM Subject: Re: To: "jeffrey E." <[email protected]> I've been thinking a lot about this the past few days, some of my thoughts below: Generally I'm very positive of the notion; there's a lot to be desired from our intemet protocols. On the other hand, I wonder if this is a variant of trumpism, we need to make the intemet great again. At what point was it great before? When their were but a select few who were able to access it; and everybody on it knew they would be meddled with a bit. Once it went too mainstream no-longer was being a hacker (or even, user) of such systems an at-your- own-risk endeavor, but was something that people depended on. Similar modern endeavors include Urbit, linked for posterity https://urbit.org, which is mostly made incomprehensible for the point of keeping out the un-enlightened. Urbit is supposed to re-imagine computing as fundamentally distributed. I think it would require very close consideration to figure out why a new intemet is actually needed. Traditionally in CS we think of a distributed system as striving to achieve Consistency, Availability, and Partition Tolerance (see Brewees theorem https://mwt.infoq.comiarticleskap-twelve-years-later-how-the-rules-have-changeAl) but unable to get all 3 as they mutually assure each other's impossibility. If we add in a fourth parameter at a second layer of abstraction, let's call it Authenticity, a fifth, Privacy, and a sixth, law enforcement, we cover the gamut of most of what people care about in an internet system. These second three principles form another triangle similar to CAP, they mutually assure the other's impossibility in some way. I think that thinking in terms of these desirable properties in terms of mutually exclusive groups is probably a useful way to consider the design space. Another well known one is Zooko's triangle: https://en.wikipedia.orgiwikilZooko%27s triangle. In any case, I've gone on a slight tangent. My point is it's one thing to say you want a new intemet because of a theoretical (or not so theoretical) button, it's another to have motive enough to actually build such a new network. Asides from the EFTA00822807 button, what properties seem critical to you? @JeremyRubin On Mon, Jul 25, 2016 at 7:08 AM, jeffrey E. <[email protected]> wrote: I liked the idea of intemet 2.0 encouraged by the reset switch. please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jee [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited EFTA00822808 and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved EFTA00822809
ℹ️ Document Details
SHA-256
ec6b0501eb6c9709a600dba73538504680e71cafa92e5c867a909f95087c1371
Bates Number
EFTA00822807
Dataset
DataSet-9
Type
document
Pages
3

Community Rating

Sign in to rate this document

📋 What Is This?

Loading…
Sign in to add a description

💬 Comments 0

Sign in to join the discussion
Loading comments…
Link copied!