• 0 Posts
  • 67 Comments
Joined 1 month ago
cake
Cake day: August 22nd, 2025

help-circle


  • Cool, I have some ideas as well, like maybe write a script that hashes configuration files that needs a secret password to put into edit mode, if the config changes without being out into edit mode first, disconnect the server. Maybe use a raspberry pi that’s hidden from the network to do this. I know that wouldn’t work for large websites maybe because they can’t afford to go down for hours at a time, but it would give you an additional layer of security for sensitive stuff. I’m more into game programming but I know how exploits work and stuff. I’m pretty sure many types of things like this already exist in the market. One idea I had was pretty neat. Basically in your eula you reserve the right to hack back people that try to hack you, and you have an automated system that uses some known exploits to get a ping or maybe install a rootkit on anyone who is trying to mess around in your system. Later you can just get on and deanonymize them. This requires you actually spend time researching your own zero days. People in defcon hacking competitions do this. They are sort of masters with decompilers and hex editors.













  • One good solution might be decentralized webhosting and infrastructure. If people want high speed access, they have to seed it at a low rate. Nothing crazy is required just constant seeding at low rates. A few max connections and a cap of maybe 50KBps min is required. You also use random hash checking against multiple clients to verify correctness, and you have p2p blacklisting of known bad actors. A solution for people who don’t have steady Internet access might be to just seed a similar amount on quota or to buy p2p credits to access the content.

    This is part of an idea I have been working on for an internet 2.0. There is a basic cryptocurrency called compute coin, and as you seed you mine coin. The verification works by utilizes many nodes to verify everything is working correctly. You can buy coin that people mine instead of seeding if you wish. A very small portion of each transaction, a fraction of a fraction of a percent goes to a nonprofit who works on the tech and fomalizes the standard. You can also just buy compute time on the network. People are free to sell their resources at whatever price they want and the market balances itself automatically. The transaction fee is calculated automatically to cover the budget of the nonprofit which oversees it. DNS is also handled p2p. If I were in control I would also make it mesh network friendly, with sliders to prioritize what the user wants, from latency, vs avoiding certain countries, vs cost, vs using a whitelist of trusted nodes for security purposes.

    This would also require swarm security to prevent any one user from being able to sniff out keys and passwords and stuff. Basically the network would work together to generate periodic temporary keys to allow machines to access the data for a period of time without revealing itself to anyone. The nonprofit would be the only completely trusted authority and it would have a board who oversees banning of nodes and the money seized would go to support the development of solutions and strategies to combat any fraud on the network. This seems expensive at first, but with Asics this can be made very cheeply. I imagine people would want to run different types of nodes to generate currency. Asics would be a good cheap solution. It’s a market that will build itself very quickly. You can also have verified nodes that cost a bit higher then average probably to access but can provide additional security for certain tasks. These can either be crowd sources or run by institutions which publish node lists.

    If the law wishes to regulate it, this could only be achieved by region specific keys and would not be network wide. Courts might have to set up a way to subohena resources that gets registered in a public domain that gets released to the public after a year or so, in order that citizens can verify what the government is snooping on.

    It can also be used for free by just having a algorithm automatically determine mining rates to pay for the use of the user, with a buffer to keep a seemless experience.

    Perhaps for this particular problem however you could just set up a p2p platform with file verification. People could offer free nodes, businesses could pay money to these nodes to get access to high speeds and large amounts of bandwidth. People can also join p2p nodes where what they can download equals to what they contribute to the network. This can just be estimated based on average use and maintained with a buffer if people really don’t want to seed all the time.