Commit b95bf4dd44c40c513c5cd4f7995e0a2d6493f1f9
Merge remote-tracking branch 'origin/bad-actors'
Stephen Whitmore committed on 1/9/2018, 8:15:19 PMParent: a338c42b5787ed52b50778d8ddc9604a7e97af83
Parent: 0e2810bf1cdf312160741fe445376c51d9c03da6
Files changed
README.md | changed |
README.md | ||
---|---|---|
@@ -134,10 +134,28 @@ | ||
134 | 134 … | |
135 | 135 … | By introducing a monotonic increasing sequence number to each new entry in the |
136 | 136 … | signed feed, peers can be assured that no messages were suppressed or censored. |
137 | 137 … | |
138 | -## 6. What areas do modern p2p apps still struggle with? | |
138 … | +## 6. What if p2p technology is used by "bad actors"? | |
139 | 139 … | |
140 … | +A very common concern with P2P technologies is that they aid crime, piracy, | |
141 … | +pedophilia, and other bad activities. The upside of not having an authority is | |
142 … | +also its unfortunate downside. That said, this aspect of information systems is | |
143 … | +overestimated when compared to other technologies like cars, weapons, hard | |
144 … | +drives, and kitchen cutlery. Terrorist attacks are carried out often through | |
145 … | +cars and common knives, yet it seems absurd to common sense that there would be | |
146 … | +global realtime surveillance of all cars and kitchen knives in order to prevent | |
147 … | +crimes. On the other hand, information systems by themselves cannot directly | |
148 … | +cause any physical harm. The absurdity of censoring cars and cutlery should | |
149 … | +extend also to information systems, or at least the discourse around security | |
150 … | +and crime prevention should get the priorities right and first address the root | |
151 … | +causes, the supporting incentives, the real weapons, and the tradeoffs involved. | |
152 … | + | |
153 … | +More about this: | |
154 … | +https://theintercept.com/2015/11/17/u-s-mass-surveillance-has-no-record-of-thwarting-large-terror-attacks-regardless-of-snowden-leaks/ | |
155 … | + | |
156 … | +## 7. What areas do modern p2p apps still struggle with? | |
157 … | + | |
140 | 158 … | Apps still seem to have a hard time managing resources, like CPU and network |
141 | 159 … | bandwidth. If an app naively tries to download and replicate ALL of the data it |
142 | 160 … | sees, it's easy for it to overwhelm the machine it's running on. Many apps still |
143 | 161 … | have a ways to go in offering good controls for CPU and bandwidth use. |
Built with git-ssb-web