None of this matters and it’s perfectly possible if you’ve got ISP’s who are in cooperation. Take the following scenario:
-
I have a node and I want a public file. Let’s keep things simple and say it’s a small file so a single chunk.
-
I put a request out into the network. What does the ISP see? They see an outbound connection from my IP address to some other IP addresses.
-
The ISP looks at the records for each of these other addresses and what do they see? Again they see outbound connections from these to other IP addresses, and so on.
-
At some point there will be no more outbound connections and one of these branches will start to rewind as the data works it’s way back towards me (or perhaps for performance reasons the node with the data just returns it directly to me - it doesn’t really matter). The important bit is that the ISP can see that I’ve now received data and whatever route it took they can trace it. I’m not saying they can make sense of what’s within the packets (you can have a million layers of encryption and obfuscation for all I care). I’m saying that they can see all participants in the conversation.
So, if I have access to ISP records and I request a public file I can determine the route it took to get to me. If I want to cause a few headlines I’ll then I’ll pull and illegal file and go after the owner of the node that was holding the data and maybe even the owners of the other nodes that aided the distribution.
If SAFE only secured private data and comms this problem goes away. If I stored an illegal file on SAFE and it ended up on your node then you can’t be party to it’s distribution because it’s only ever coming back to me. Also I’m sure you’ll be perfectly safe talking to friends over the network because outside parties can’t decrypt anything. The fact that nodes are communicating though is definitely detectable by an ISP (because they are our only route into the Internet) and if you know what your looking for then you can tie real data to these nodes (or at very least have a high degree of certainty of doing this).
In my opinion it’s the fact that SAFE is trying to secure public data is what’s going to cause it pain. You can’t have complete privacy when it comes to public data and this will also be what drives the motivation to tarnish it’s name, monitor it closely and try to bring it down.
EDIT: You’re bound to argue that any node could have multiple connections at any one instant. Of course this is true but it also might not. Plus there are likely to be patterns that can be used to link network transactions together.