EFTA00630174.pdf
PDF Source (No Download)
Extracted Text (OCR)
From: Danny Hillis •
To: "Jeffrey E." <jeevacation@gmail.com>
Subject: Re:
Date: Sat, 30 Jul 2016 12:33:27 +0000
The two properties that the Internet lacks are guaranteed quality of service (bandwidth and latency)
and the ability to know for sure where a packet originated. These two features are fundamentally
incompatible with the design of the Internet and they trade off against other features. For instance the
second network I have in mind may well be inferior to the Internet in efficiency of utilization of the
resources , so it will cost more per bit to send a message. It will probably be worse the than the Internet
in supporting anonymity. So it it not a replacement for the Internet, but a complement to it.
On Fri, Jul 29, 2016 at 9:58 PM, jeffrey E. <jeevacation@gmail.com> wrote:
Forwarded messa e
From: Jeremy Rubin
Date: Thu, Jul 28, 2016 at 9:51 AM
Subject: Re:
To: "jeffrey E." <jeevacation@gmail.com>
I've been thinking a lot about this the past few days, some of my thoughts below:
Generally I'm very positive of the notion; there's a lot to be desired from our internet protocols.
On the other hand, I wonder if this is a variant of trumpism, we need to make the intemet great again. At what point was it
great before? When their were but a select few who were able to access it; and everybody on it knew they would be
meddled with a bit. Once it went too mainstream no-longer was being a hacker (or even, user) of such systems an at-your-
own-risk endeavor, but was something that people depended on.
Similar modern endeavors include Urbit, linked for posterity https://urbit.org which is mostly made incomprehensible for the
point of keeping out the un-enlightened. Urbit is supposed to re-imagine computing as fundamentally distributed.
I think it would require very close consideration to figure out why a new intemet is actually needed. Traditionally in CS we
think of a distributed system as striving to achieve Consistency, Availability, and Partition Tolerance (see Brewees
theorem https://mwrinfoq.corniarticleskap-twelve-years-later-how-the-rules-have-changeA) but unable to get all 3 as they
mutually assure each other's impossibility. If we add in a fourth parameter at a second layer of abstraction, let's call it
Authenticity, a fifth, Privacy, and a sixth, law enforcement, we cover the gamut of most of what people care about in an
internet system. These second three principles form another triangle similar to CAP, they mutually assure the other's
impossibility in some way.
I think that thinking in terms of these desirable properties in terms of mutually exclusive groups is probably a useful way to
consider the design space. Another well known one is Zooko's triangle: https://en.wikipedia.orqhviki/Zooko%27s triangle.
In any case, I've gone on a slight tangent. My point is it's one thing to say you want a new intemet because of a theoretical
(or not so theoretical) button, it's another to have motive enough to actually build such a new network. Asides from the
button, what properties seem critical to you?
@JeremyRubin
On Mon, Jul 25, 2016 at 7:08 AM, jeffrey E. <jeevacation@gmail.com> wrote:
I liked the idea of intemet 2.0
encouraged by the reset switch.
EFTA00630174
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to jeevacation@gmail.com, and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to jeeNS@gmail.com, and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
EFTA00630175
Document Preview
PDF source document
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
Extracted Information
Document Details
| Filename | EFTA00630174.pdf |
| File Size | 136.8 KB |
| OCR Confidence | 85.0% |
| Has Readable Text | Yes |
| Text Length | 4,491 characters |
| Indexed | 2026-02-11T23:10:41.154929 |