asciilifeform: 16th c. trigonometers did not have to beg folks to agree. they were fought over by the chiefs of their time, because artillery.
asciilifeform: point here was that it has immediate engineering applications. like trigonometry.
asciilifeform: i've no idea why he did it. for all i know, 'they' threatened to feed his children to shoggoths if he refrained.
asciilifeform: sorta like what a more clever usg would have offered.
asciilifeform: mr mold realized this, but for reasons of his own he ended up crapping out a centrally-controlled abortion
asciilifeform: the important takeaway from the earlier thread is that 'democracy is mistake, hierarchy is useful concept' is a testable hypothesis with immediate engineering applications.
asciilifeform: to finish the earlier thread: machine on the other end of the link (destination) decides whether to keep packet and attempt payload reassembly based on simple criteria: 1) is it a hello from a wot-blessed (from his pov) key 2) is it signed by an ephemeral key from one such 'hello' received recently.
asciilifeform: at any rate, tiny packets plus fountain code plus each one is signed, will work great with transmission media other than internet (say, shortwave)
asciilifeform: but if working with existing planet, have to swallow some very basic dirt like udp.
asciilifeform: fucking magic numbers << mircea_popescu wants to buy everyone on the planet a new nic and lay own oceanic fibers, launch own satellites, etc. ? sure, why not.
asciilifeform: what follows is the payload, divided into K gibblets, each below udp mtu in size, each signed with ephemeral key. the gibblets are coded using fountain code (e.g. 'raptor') and you need N of K - in any order - to reassemble.☟︎
asciilifeform: here's a very rough description of above experiment. to start a transmission a --> b, 'a' sends a hello (udp) packet, which consists of an ephemeral rsa key, hash and length of (coming) payload, and all of the preceding signed with his wot key. this fits handily below the traditional 576 byte mtu.
asciilifeform: but not ready for battlefield. and no time now.
asciilifeform: i may have spoken of this once. i've a very rough draft of precisely this, using an interesting bit of mathematics called 'fountain code'
asciilifeform: if want some other network - have to produce it.
asciilifeform: let's rephrase a little. the internet as presently exists, is, in practice, mainly a machine for 1) connecting derps to 'reddit' and 'arsebook' 2) routing ddos packets to trilema, qntra...
asciilifeform: remember that ddos does not necessarily require 'amplification'
asciilifeform: who wishes to pay for this? mircea_popescu ?
asciilifeform: you're talking about, unless i misunderstand, 'pushing' one bit for each 'pulled' ?
asciilifeform: the problem with 'amplification attack' isn't that i can send b bytes and get K*b back. failing this - tremendous waste! problem in actuality is spoofed packets getting routed, which at this point is always and without exception the result of idiot network designers and admins