View Single Post
Old 06-09-02, 04:46 AM   #8
TankGirl
Madame Comrade
 
TankGirl's Avatar
 
Join Date: May 2000
Location: Area 25
Posts: 5,587
Wink

Quote:
Originally posted by kento
so...ranger inc....can't do it? microsoft can't do it? riaa can't do it? why then do you want to do it TG? This disturbs me....why does it matter?
Anybody could establish their own unique identity as a peer in the network. But with verified identities you could start building trust relationships, protected invite-only groups etc. 'above' the public network structure. This would allow the emergence of much more sophisticated social structures and content distribution chains than what we have seen so far.

A practical example: say you have a good hotlisted contact with whom you would like to do some privileged sharing (larger shares, bandwith prioritizing). To do this you want to know reliably who you are dealing with so that no outsider could 'steal' the given privileges.

Reliable peer identities would also make a good basis for an intelligent leech control system. If your client would automatically reward (with bandwidth, shorter queue times etc.) peers that have contributed to you recently, non-spoofable identities would be a must.

- tg
TankGirl is offline   Reply With Quote