all messages for Guix-related lists mirrored at yhetil.org
 help / color / mirror / code / Atom feed
From: ng0@n0.is
To: guix-devel@gnu.org
Subject: Re: Lightning talk at IPFS camp
Date: Thu, 13 Jun 2019 21:38:00 +0000	[thread overview]
Message-ID: <20190613213800.b3erymawvotgdhyk@uptimegirl> (raw)
In-Reply-To: <87y32ff7w9.fsf@ambrevar.xyz>

Pierre Neidhardt transcribed 1.7K bytes:
> Thank you all for your comments!
> 
> > That sounds like a great opportunity. Guix and IPFS are in my humble
> > opinion two of the most interesting ongoing projects in the computing
> > world.. Bringing the two together can only make this better.
> 
> My humble opinion is on the same page ;)
> 
> >	 - A unified way to refer to stuff (I am thinking of IPLD here)
> >		 No more tarballs, git commits, etc. CIDs everywhere.
> 
> Do you have a concrete use case?
> 
> >	 - A unified storage scheme for all data, both "system" and "user".
> 
> Can you elaborate?
> 
> 
> I'm not too sure about how human input would be logged, but at the very
> least the idea of distributing the store seems amazing.
> 
> In a not so distant future, we could simply distribute the store of
> everyone.
> So if Alice built qtwebkit locally (at last!), then Bob will be able to
> fetch the substitute.  There would be no difference between substitute
> servers and Guix users connected to the Internet.
> 
> Anonymity should not really be a problem here, and even then it could be
> done over Tor.
> 
> Thoughts?

Skipping all the rest, my brief comment on the tor point:
You don't want to use tor for this.
1) it depends on the country if it is safe at all to use
2) tor has some recent RFCs and/or papers which hint at what we've been
   talking about for years, tor in its current form does not scale for
   applications like this (even when the throughput of the servers in the
   tor network got faster globally).

At best make it an opt-in choice, legal reasons and safety considerations
of your entire user base / community call for (1) as a reason,
but also for (2) because you want to actively work on the relevant RFCs
to not make this an annoyance both for you and tor.
While some operating systems have the official blessing, I seem to recall
(paper notes...) that in no case tor said it is a good decision to sent
package manager traffic through it.

Since you have no covertraffic, the point for anonymity is moot anyways.

What's more, you buy into a couple of more points of authority to trust
(in particular directory server operators, their ISPs, and so forth).

I leave it up to you to gather the sources, I don't want to provide them
right now as it is doable with enough time for yourself to see this is
a bad idea.

> -- 
> Pierre Neidhardt
> https://ambrevar.xyz/

  parent reply	other threads:[~2019-06-13 21:38 UTC|newest]

Thread overview: 20+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-05-30  7:07 Lightning talk at IPFS camp Pierre Neidhardt
2019-05-31 22:10 ` Ludovic Courtès
2019-06-03 15:15 ` Konrad Hinsen
2019-06-03 16:19   ` Pronaip
2019-06-03 18:53     ` Konrad Hinsen
2019-06-06  8:13       ` Pierre Neidhardt
2019-06-06 12:15         ` Konrad Hinsen
2019-06-06 12:36           ` Pierre Neidhardt
2019-06-06 16:53             ` Konrad Hinsen
2019-06-07 12:39             ` Ludovic Courtès
2019-06-07 13:48               ` Konrad Hinsen
2019-06-07 20:10                 ` Ludovic Courtès
2019-06-07 12:41             ` Ludovic Courtès
2019-06-07 13:45               ` Konrad Hinsen
2019-06-13 21:38         ` ng0 [this message]
2019-06-24 20:37 ` Pierre Neidhardt
2019-06-26 12:19   ` Pierre Neidhardt
2019-06-27 14:53   ` Ludovic Courtès
2019-06-27 22:04     ` Pierre Neidhardt
2019-07-01 10:16       ` Ludovic Courtès

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20190613213800.b3erymawvotgdhyk@uptimegirl \
    --to=ng0@n0.is \
    --cc=guix-devel@gnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this external index

	https://git.savannah.gnu.org/cgit/guix.git

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.