There was a similar topic about this time last year that now resides in the “off-topic” category. I’m initiating this one as it relates to cybersecurity, external threats, etc. I’m working on something and want the community input to help really examine the possibilities more deeply.
There are a lot of very good reasons why it will be difficult to outlaw the use and maintenance of the SAFE Network.
Amongst those reasons:
Open Source - so there is no proprietary point of attack, other than to take down git-hub feed. Even then, there is no point of central attack once the network is running. Software could be hosted on the SAFE Network and downloaded via a browser plug-in possibly. (Or will the software need to be installed on the machine for the plug-in to work?)
Completely distributed: No central servers means no central attack point, so enforcement of a ban in any area is on a machine by machine, person to person basis, and even if many shut down, wouldn’t hinder the use by those remaining as long as they can connect to the network.
Traffic analysis: It is my understanding that it will be difficult to isolate users by traffic analysis due to scatter-gather and other obfuscation features being built in. This warrants consideration because ISPs could be empowered to quash anything that could be determined to be SAFE traffic.
The list of this sort of points can be expanded a lot, I’m sure.
So now let’s also examine steps that would have to be taken to make any stab at making use illegal and enforcing such a ban:
Demonization and ban: This could be done in any jurisdiction which could muster the political leeway to do so. Dictatorial and tyrannical states could be partially effective in suppressing wide adoption, perhaps.
Laws allowing and even mandating corporate cooperation: Using spyware/snoopware in Microsoft and Apple products to detect SAFE software or activity and rat on users.
Harsh penalties: this sort of technology, which allows for unsnooped action, could be declared a terrorist tool and anyone found using it could be served with severe penalties to discourage its use.
I don’t have time at the moment to flesh this out further, but I’d really like help fleshing out both sides of this.
I’m a real believer in the SAFE Network, as I think is obvious, and so it’s easy for me to dismiss these sort of attack vectors. The resistance level of the approach is one of the reasons I’m so sold. But let’s really dig in and look this over for real.
Let’s look at what the threat levels are and then also look at what can be done to mitigate them, including technical, social, PR, killer app that would be unpopular to ban, etc.
I won’t be around for a while to monitor the responses, so have fun and I’ll catch up when I can.