Back to Results

EFTA02457348.pdf

Source: DOJ_DS11  •  Size: 185.7 KB  •  OCR Confidence: 85.0%
PDF Source (No Download)

Extracted Text (OCR)

From: jeffrey E. <jeevacation@gmail.com> Sent: Saturday, July 30, 2016 1:59 AM To: Danny Hillis Subject: Fwd: Forwarded messag= From: Jeremy Rubin =ate: Thu, Jul 28, 2016 at 9:51 AM Subject: Re: To: "jeffrey E.8suot; <jeevacation@gmail.com <mailto:jeevacation@gmail.com> I've been thinking a lot =bout this the past few days, some of my thoughts below: <=r> Generally I'm very positive of the notion; there&#=9;s a lot to be desired from our internet protocols. =/div> On the other hand, I wonder if this is a variant of trump=sm, we need to make the internet great again. At what point was it great b=fore? When their were but a select few who were able to access it; and eve=ybody on it knew they would be meddled with a bit. Once it went too mainst=eam no-longer was being a hacker (or even, user) of such systems an at- you=-own-risk endeavor, but was something that people depended on. Similar modern endeavors include Urbit, linked =or posterity https://=rbit.org <https://urbit.org> , which is mostly made incomprehensible for the point of keepi=g out the un-enlightened. Urbit is supposed to re-imagine computing as fun=amentally distributed. I think it w=uld require very close consideration to figure out why a new internet is a=tually needed. Traditionally in CS we think of a distributed system as str=ving to achieve Consistency, Availability, and Partition Tolerance (see Br=wer's theorem, https://www.in=oq.com/articles/cap-twelve-years-later-how-the-rules-have-changed <https://www.infoq.com/articles/cap-twel=e-years-later-how-the-rules-have-changed> ) but=unable to get all 3 as they mutually assure each other's impossibility= If we add in a fourth parameter at a second layer of abstraction, let'=s call it Authenticity, a fifth, Privacy, and a sixth, law enforcement, we=cover the gamut of most of what people care about in an internet system. T=ese second three principles form another triangle similar to CAP, they mut=ally assure the other's impossibility in some way. I think that thinking in terms of these desirable prope=ties in terms of mutually exclusive groups is probably a useful way to con=ider the design space. Another well known one is Zooko's triangle: =A0https://en.wikipedia.org/wiki/Zooko%27s_triangle. In any case, I've gone on a slight tangent. My=point is it's one thing to say you want a new internet because of a th=oretical (or not so theoretical) button, it's another to have motive e=ough to actually build such a new network. Asides from the button, what pr=perties seem critical to you? <=div> EFTA_R1_01561098 EFTA02457348 @JeremyRubin <https://twitter=comileremyRubin> chttps://twit=er.com/JeremyRubin> On Mon, Jul 25, 2016 at 7:08 AM, jeffrey E. =span dir="ltr"><jeevacation@gmail.com <mailto:jeevacation@gmail.com» wrote: I liked the idea of internet 2.0 =AO encouraged by the reset switch. =AO please note The information=contained in this communication is confidential, may be attorney-clientrprivileged, may constitute inside information, and is intended only for=br>the use of the addressee. It is the property of JEE Unauthorized =se, disclosure or copying of this communication or any part thereof is =trictly prohibited and may be unlawful. If you have received this co=munication in error, please notify us immediately by return e-mail or b= e-mail to jeev=cation@gmail.com <mailto:jeevacation@gmail.com> , and destroy this communication and all copies the=eof, including all attachments. copyright -all rights reserved =AO please note The information contained in this commu=ication is confidential, may be attorney-client privileged, may cons=itute inside information, and is intended only for the use of the addre=see. It is the property of JEE Unauthorized use, disclosure or copyi=g of this communication or any part thereof is strictly prohibited a=d may be unlawful. If you have received this communication in error, pl=ase notify us immediately by return e-mail or by e-mail to jeevacation@gmail.com, a=d destroy this communication and all copies thereof, including all a=tachments. copyright -all rights reserved 2 EFTA_R1_01561099 EFTA02457349

Document Preview

PDF source document
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.

Document Details

Filename EFTA02457348.pdf
File Size 185.7 KB
OCR Confidence 85.0%
Has Readable Text Yes
Text Length 4,184 characters
Indexed 2026-02-12T17:30:05.070911
Ask the Files