andrewducker: (Default)
andrewducker ([personal profile] andrewducker) wrote2003-06-03 09:04 pm

WASTE ettiquette

So, I invited Aberbotimue and PurelySkinDeep and Gonmatron and Protempore to join me in our filesharing excercise.

Then AlienSpaceBat said Hi and we exchanged keys. Great, I thought, a 6th member.

He had 5 people in his bit of the network, and guess what, we're now a 10-person network!

I had just been thinking "Hmm, is it reasonable to expand this without asking other people?" I guess it's a tad late for that now...

Amusingly, one of them sent messages to all of us, saying that we were welcome to join their network and could we introduce ourselves :->

On the other hand, one of the new people has told me that there's a search facility, which I've just used to find lots of cool stuff spread across the network.

Which is about 150Gigabytes of 'stuff'

[identity profile] allorin.livejournal.com 2003-06-03 02:15 pm (UTC)(link)
Waitwaitwaitwaitwait - so you can search each other's PCs?

[identity profile] gnomatron.livejournal.com 2003-06-03 03:26 pm (UTC)(link)
hmm. Well, I only connected to PurelySkinDeep, and didn't realise that'd connect me to other folk when I first connected... at a small level, it's ok, as for now I know that either I know or a friend knows all the people on the network, but if it expands any more there'll be people on it more removed than that... there's an interesting chunk of idea forming here, regarding trust metrics... mayeb something to talk to ciphergoth about, he seems to know his stuff as far as such things are concerned.

[identity profile] alienspacebat.livejournal.com 2003-06-04 12:25 am (UTC)(link)
I guess it depends on the type of network. There are options for not broadcasting your public key and limiting by ip address and network name. So if you only wanted to talk to a few people and close it you could all share keys manually. In a network where the keys are spread freely, expansion is inevitable and generally accepted. You can still choose not to propogate your key if required and then send it to certain collected users.

[identity profile] protempore.livejournal.com 2003-06-04 04:44 am (UTC)(link)
Hmn, yeah . . . we might end up having to go thru and use that IP filter feature; or give ourselves a network name to hide out on.