View Single Post
Old 20-07-04, 03:06 PM   #27
TankGirl
Madame Comrade
 
TankGirl's Avatar
 
Join Date: May 2000
Location: Area 25
Posts: 5,587
Default

Quote:
Originally Posted by shepdog
It would be nice for a content provider to be able to identify the user that gave money and to target that user in the future because they donated in the past. The problem with this is that if I can tie say a paypal account to a hash for this purpose it would negate the anonymous aspect of the single hash used as identity. Because if that use ever provided a file encrypted with that hash I could tie it right back to them. I was thinking of a way around this by providing a Identity public key that the user would be known by, but also the user would have a public encryption key that would be used for all encryption related transmissions to/from the user. This would allow a seperation between the public identity of user and allow them to contriibute to things they think is worthwhile and to be rewarded by that content provider as well as remain anon when they don't want to contribute to a content provider but still want to snag content.
Right. There is no problem with peers having multiple identities for different purposes. In your case, as the low level network topology is a lattice, you might want to use temporary disposable identities for the nodes in their role as lattice members. These would be purely technical identities without history, merits or credits - just to allow the peers to run protected sessions with each other and to refer to each other (in peer discovery, lattice reconfiguration etc) in a reliable way. In other, more social roles the peers could use more permanent identities with a history and associated merits and credits.

Instead of having a single permanent identity for all your social interactions it might be safer to have a set of permanent identities, one for each established social relation (peer contact, group membership etc). This way, if any of those identities would get lost, compromised or troubled, you would not lose your entire social position and credentials but just the compromised part of it. This sort of arrangement would also help to make the peer discovery process more secure: when searching for a given peer you would search for an identity that would be unknown or irrelevant to most other peers.

- tg
TankGirl is offline   Reply With Quote