neo
March 20, 2016, 2:32pm
3
Speculation might not be a great thing, but actual possibilities would be better. Speculation is things without requiring any basis in fact or reality. If we are going to explore things that might cause SAFE to fail then it is best to use cases that have some basis.
Anyhow a search of the forum will bring up plenty of possible things that might cause SAFE to fail and the discussions in each explore that possibility.
Here are but a few I found in one minute
First, I am excited by the team’s work and confident about the success of MAID. But there still may be some risk resulting in the failure of it:
fundamental principles
technological factors
3)marketing factors
4)other similar project alive before MAID;
insufficient fund
There was a similar topic about this time last year that now resides in the “off-topic” category. I’m initiating this one as it relates to cybersecurity, external threats, etc. I’m working on something and want the community input to help really examine the possibilities more deeply.
There are a lot of very good reasons why it will be difficult to outlaw the use and maintenance of the SAFE Network.
Amongst those reasons:
Open Source - so there is no proprietary point of attack, other than to …
There are a few ifs here, but with several vaults (and my understanding of the system which may be flawed) I believe this could be pulled off.
(Assertions)
*Gets on safe are free.
*Gets generate a potential income for the first to respond with the correct data
*chunks are put in cache once received
*Users can see what chunks they hold
*chunks are vulnerable to plain text attack (talking public data)
*chunks are requested from the closest data managers in xor space
(/assertions)
It seems…
This could perhaps be a dastardly plan: Automate the process of registering new usernames on the network and register all available names up to say 10 characters (or perhaps all dictionary words, one or in combination up to a certain character length for ’simplicity’). Pretty user unfriendly for everyone else at that point right?!
Plus the person/entity which did that would be able to hold the network to ransom just like people currently do by parking domain names.
Possible (although not perha…
Background
In Australia and Germany there are cases where a person has been convicted for aiding the criminal/copyright infringment by acting as a relay of encrypted information that the person could not know anything about.
Plus Australian copyright law is clear on a person passing infringing copies on is (criminally) liable
[EDIT: I unfortunately made a mistake on the TOR link. I had followed an Australian news article which gave that techdirt link and claimed it was an Australian case. …
6 Likes