Delivery-Date: Fri, 08 Jan 2016 04:37:30 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 08AD41E0119;
	Fri,  8 Jan 2016 04:37:29 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 5D4CE33418;
	Fri,  8 Jan 2016 09:37:22 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id C341D21392
 for <tor-talk@lists.torproject.org>; Fri,  8 Jan 2016 09:37:18 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id kTKADmreGD2B for <tor-talk@lists.torproject.org>;
 Fri,  8 Jan 2016 09:37:18 +0000 (UTC)
Received: from mail-io0-x22d.google.com (mail-io0-x22d.google.com
 [IPv6:2607:f8b0:4001:c06::22d])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 9FBE820EF1
 for <tor-talk@lists.torproject.org>; Fri,  8 Jan 2016 09:37:18 +0000 (UTC)
Received: by mail-io0-x22d.google.com with SMTP id 1so233909369ion.1
 for <tor-talk@lists.torproject.org>; Fri, 08 Jan 2016 01:37:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:in-reply-to:references:from:date:message-id:subject:to
 :cc:content-type;
 bh=78bu6tTvSQUWBpeu7IWJisdSoEhHsCmdyAejN7cjlxE=;
 b=l60EplzHoH4C/GWFeNJFpcLP2CDfKGQFRyoVXnH4iN09MtfqrvH8+Iohy+zZNx4Tpm
 3HN1Hvvczjw1TMJIYRL622JwjY/04KXemLfjj3Hoyv2qI5v4a6fKbEm6B9AOYCpRe8bh
 EXv55K6qHRRgTLpN5K52L5xvv60+xTBN3CW6oE5PmrvRqbhfg+eBMTsiBHkossB2PGqC
 0K3Ewr2miHwT6Fl3RSSSs4oijzEsemg1UWP0uY1tYDXIVRTEsmv7CpIEXFyWwsLJPzEK
 Q4bLWgq6LhjTOlnwskqEzrPuMLavtEyfDBCZ0q+OHaTTeUKP4/mdZBEs9V4VjADuwhyU
 dj2Q==
X-Received: by 10.107.185.6 with SMTP id j6mr96950022iof.111.1452245836495;
 Fri, 08 Jan 2016 01:37:16 -0800 (PST)
MIME-Version: 1.0
Received: by 10.36.137.197 with HTTP; Fri, 8 Jan 2016 01:36:37 -0800 (PST)
In-Reply-To: <5A9308FB-9802-46C1-BDD1-C668B6F1F9EB@gmail.com>
References: <5A9308FB-9802-46C1-BDD1-C668B6F1F9EB@gmail.com>
From: grarpamp <grarpamp@gmail.com>
Date: Fri, 8 Jan 2016 04:36:37 -0500
Message-ID: <CAD2Ti28ZrnCKt_tqi2zPvSixHKTL-8PNV8JjHeZei85zTh0twg@mail.gmail.com>
To: tor-talk@lists.torproject.org
Cc: cypherpunks@cpunks.org
Subject: Re: [tor-talk] Chaum Fathers Bastard Child To RubberHose ...
 PrivaTegrity cMix
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Fri, Jan 8, 2016 at 4:22 AM, Bryan Ford <brynosaurus@gmail.com> wrote:
> Andy Isaacson wrote:
>> The privaTegrity (PT) backdoor is significantly more malignant than the
>> Tor dirauth issue.

[Massive snip in from worthwhile tor-talk thread on central points of
authority / DHT...]

Are there networks where there is an autonomous AI engine within
the network itself, a possible distributed execution sandbox,  that
decides what, likely changing over time, set of nodes will serve elevated
roles?
And where AI's programmed evaluation metrics may somehow be tied
to some kind of consensus wherein like blockchain, major portions
of net must agree or risk fork.
And how self-adaptive and permanent is the AI?
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

