The Digital Commons encompasses the entirety of digital artifacts, from code to training data for large language models, that is available to the public. Much like land-based commons, it’s value is intrinsically linked to being an equitably accessible resource. The commons is the cultural and natural resources accessible to all members of a society, including natural materials such as air, water, and a habitable Earth. These resources are held in common even when owned privately or publicly...| Interpeer Project
The term “peer-for-peer” stems from Zenna Elfen’s master thesis[^cite-1] and describes networking protocols that are characterized by small,...| Interpeer Project
Data Sovereignty is a part of Digital Sovereignty, and means having full and unrestricted control over the data one owns, and implies control over personally identifiable information (PII). #Definition Definitions are often restricted to merely being able to access and move data at will. However, there are distinct concerns that also affect this ability, which bear keeping in mind: Data Transparency refers to the transparency that is provided in storing personal data and for fine-grained acce...| Interpeer Project
Technical Sovereignty refers to having access to knowledge and operational artifacts of digital technology, such that it can be freely used and adapted....| Interpeer Project
#Introduction CAProck provides an implementation of a distributed authorization scheme with cryptographic guarantees. It is essentially a distributed Object-capability model using a cryptographic variant of a Power of Attorney model for ensuring it can be used in a fully distributed manner. #Operation Centralized authorization schemes query a centralized service whether an authenticated entity (a subject) currently holds a privilege or permission (a predicate) for a given object1. Distributin...| Interpeer Project
#Introduction Channeler is a multi-channel protocol with per-channel capabilities. It’s something of a parallel development to QUIC, but with distinct features. The design for channeler was originally inspired by experience with video streaming over peer-to-peer networks in 2006-2009. In order to safely traverse NATs, a UDP-based implementation is required. Using that, however, means losing reliability criteria of TCP. From an application perspective, however, it’s not always clear which ...| Interpeer Project
A deceptive pattern is a way of presenting choices to people that are manipulative, tricking them into making choices that are not in their best interest. The term is often applied in the field of user experience design, and cookie banners are a perfect example of deceptive patterns. Not only are cookie banners themselves often superfluous – purely functional cookies usually do not require them, only advertising/tracking cookies do. But more often than not, the “accept all cookies” choi...| Interpeer Project
Delay-tolerent networking refers to techniques for networking systems where delays and intermittency are orders of magnitutes larger than on the internet, such as in e.g. deep space communications. In the Internet Engineering Task Force, there exists a DTN working group that standardizes the Bundle Protocol, which is an implementation of the DTN architecture. In doing so, it co-operates with the Consultative Committee for Space Data Systems (CCSDS), which is a multi-national forum for the dev...| Interpeer Project
A comprehensive definition inspired by the Digitale Souveränität als Strategische Autonomie (German; “Digital Sovereignty as Strategic...| Interpeer Project
Donate Today! The Internet under Threat The internet promised to be this amazing network that could bring people around the world together! But whether it is surveillance capitalism that collects data about you, or political troll farms that spew disinformation, that liberating and unifying internet is increasingly under threat.| Interpeer Project
FOSSWashing refers to practices that follow the letter of free and open source software (FOSS) development, but not the spirit. #Related The term #OpenWashing is related, but unnecessarily restricted to just “open source”, ignoring free and libre software. Both share their origins in the greenwashing term.| Interpeer Project
| Interpeer Project
#Introduction The GObject SDK provides a convenient mapping from wyrd properties to GObject properties and vice versa. GObject is an object abstraction for use with GTK applications. In the GObject model, it is possible to listen for and emit signals. Properties are named object members that emit a signal when modified. When a user interface element modifies an internal object variable, it is possible to listen for this, and immediately trigger an application state change.| Interpeer Project
The term “Human-Centric Internet” describes an internet for humans. It highlights individual human concerns, in contrast to e.g. the Internet of Things (IoT), which is focused on connectivity for smart devices. The European Commission’s Next Generation Internet (NGI) initiative aims for a human-centric internet. #Context Human concerns are plentiful, and since the current internet is build by humans, what precisely is it that makes a human-centric internet different from what we see today?| Interpeer Project
#Contact Interpeer gUG (haftungsbeschränkt) Feldgereuth 8 86926 Greifenberg DE - GERMANY info@interpeer.io #Legal/Tax Information RegistrationNumber Amtsgericht AugsburgHRB 37686 VAT/USt-IdNr.DE355996098 #Legal Disclaimer The contents of our pages have been created with the utmost care. However, we cannot guarantee the contents’ accuracy, completeness or topicality. According to statutory provisions, we are furthermore responsible for our own content on these web pages. In this context, ...| Interpeer Project
Information-centric networking is an evolution of peer-to-peer (p2p) concepts. To illustrate this, let’s quickly review how the world wide web works. #URLs You all know URLs, the addresses you may enter into or see in a browser bar. The term URL stands for “Universal Resource Locator” – the key part being the last word. A URL tells the browser where something is located. There is a related concept of URIs (Universal Resource Identifiers). To make matters more complicated, all URLs are...| Interpeer Project
Informed consent is given when someone consents to something after having been adequately informed of the consequences. Consent without sufficient information is not informed consent. The distinction matters when people enter into agreements they may later regret. Sufficient up-front information both helps them avoid such agreements in the first place – but it also helps avoid liability when sufficient information was provided.| Interpeer Project
A large part of the Internet is effectively owned by former colonial powers. This applies both to the physical infrastructure of the Internet, as well as the content that is available for perusal. The Robert Bosch Academy defines decolonisation as a strategy that connects a lot of different movements that question these power structures and attempt to challenge them. It is our view that a human-centric networking architecture contributes to decolonisation by moving control over content away f...| Interpeer Project
In 2012, Professor Gote Nyman coined the term Internet of Behaviours (IoB) to describe a network in which behavioural patterns would have an IoB address in the same way that each device has an IP address in the Internet of Things (IoT). However, the term IoB is most often used to describe an extension of the Internet of Things (IoT). A network of interconnected physical and digital objects that collect and exchange information over the Internet, linking this data to specific human measured or...| Interpeer Project
#Introduction Liberate is a platform abstraction library, written in C++. It serves all other projects. Providing a good platform abstraction in C++ is difficult. The standard library covers only so much ground. Larger library collections such as boost provide great resources, but at the expense of large binary sizes and, in some cases, custom build tools. These make it difficult to maintain cross-platform builds. Given that the needs of Interpeer’s sub-projects are relatively narrow, it wa...| Interpeer Project
#Mission Statement The law in Germany regarding non-profit entities like Interpeer gUG mandate that a specific set of laws is referred to in a mission statement that is part of the legal entity’s by-laws. This has to be included in German. Below is the German original, as well as a version translated into English. #German Zweck der Gesellschaft ist die Förderung der Wissenschaft und Forschung (§ 52 Abs. 2 Satz 1 Nr. 1 AO) sowie Förderung der Erziehung, Volks- und Berufsbildung einschlie...| Interpeer Project
OpenWashing refers to practices that follow the letter of open source, but not the spirit, with the intent of falsely making something appear as open when it follows a closed ideology. #Open Source “Open” has many different meanings, but colloquially it is understood to have permissionless access to either participation in or results of a process. In practice, it may not even mean that. In the context of Open Source it is used to describe a permissionless model of collaboration in softwar...| Interpeer Project
#Introduction Packeteer is a cross-platform networking abstraction with a socket-like interface, providing datagram capabilities as first class citizens. The design of this library goes back a long time, before networking code was anywhere near standardization in C++. While this is changing, even now the majority of abstractions over sockets in C++ assume a connection-oriented design, which on the Internet implies TCP/IP. However, in order to implement protocols that do not follow the connect...| Interpeer Project
Peer-to-peer refers to a mode of connecting computers so that every participating node is equal in rights and responsibilities, at least potentially. Unlike the client-server model, peers in p2p can choose whether to initiate an action (acting as a client) or respond (acting as server) at any time. #Client-Server In the client-server model of networking, the protocol design determines which machine initiates a request or action, and thus acts as the client. By contrast, a server machine idles...| Interpeer Project
Personally identifiable information or PII for short refers to any information that can be used, either alone or together with other information, to identify a person. Some countries or states place particular protections on such data, such as via the European Union’s General Data Protection Regulation or the California Consumer Privacy Act. Unfortunately, not all legislations have such specific laws – however, as the right to privacy is one right codified in the Universal Declaration of ...| Interpeer Project
PrivacyWashing refers to practices making something appear conscious of the data privacy rights of individuals, when in actual fact data privacy is not a big concern. For example, the law may permit collecting personally identifiable information without asking for informed consent. When an entity then advertises an easy method for reviewing and deleting gathered information, without disclosing when such data is collected, that could count as PrivacyWashing. The first concern of privacy consci...| Interpeer Project
#Introduction Similar to liberate, s3kr1t is primarily an abstraction library. However, rather than abstracting out platform differences, the goal is to provide abstraction from cryptographic libraries of the underlying operating system. The library is best understood as a very narrow slice of an API for the specific cryptographic functions the other Interpeer sub-projects need. Other than providing a stable API independent of cryptographic library used, this primarily simplifies the maintena...| Interpeer Project
| Interpeer Project
#Introduction This library is a tiny C++ header implementation of spin bit based RTT measurements in network traffic. The design is inspired by QUIC, and based on Piet De Vaere's master thesis. #Overview The spin bit is a single bit that the client in a network connection sends, and the server reflects back. When the client receives a bit with the same value it has sent, it flips the bit for the next packet it sends. In this way, an observer in the middle can infer a round-trip and time it ac...| Interpeer Project
Surveillance capitalism refers to the practice of monetizing data collected about the users of a service. Doing so increases the incentives for collecting more user data, which in turn violates user privacy further. The practice may be legal, if the user consents to the collection of data. Some businesses offer free services in exchange for the use of user data. Unfortunately, it is not always made sufficiently clear how the data is used, and whether it involves the collection of personally i...| Interpeer Project
#Introduction Vessel is a container format for information-centric networking (ICN) resources, suitable also for streaming applications. It provides optional confidentiality via encryption, and permits multiple authors to contribute to the same resource in parallel. Being a container format, it encapsulates arbitrary data. In order to support multiple authors, it provides an extensible mechanism by which the owner of the resource can specify which authors are permitted1. As a side effect, ves...| Interpeer Project
Wyrd is an implementation of a Conflict-free Replicated Data Type (CRDT) built to integrate with vessel, and thus provides a framework for collaborative...| Interpeer Project
A few days ago, a vulnerability in xz-utils named CVE-2024-3094 was discovered, and since then the open source community as well as security pundits fall over themselves and each other to provide the best analysis of this incident. Don’t worry, this post isn’t another one of those. Because while all the speculation about what motivates such a long-term attack is fun, the underlying issue is way, way simpler. In a tweet1, Heather Adkins of Google posted an “unpopular opinion: if your hob...| Blog Index on Interpeer Project
Yesterday, we explored the differences between a Merkle DAG and vessel’s DAG. Today’s topic revolves around how combining wyrd’sconflict-free, replicated data type (CRDT) with vessel makes a specific kind of CRDT, namely a DAG-based one. Figure: “Fractal Structures” by SolomonVipe is licensed under CC BY-SA 2.0 #Conflict-Free, Replicated Data Types A quick recap on CRDTs first. They’re data types, largely fairly simple ones, such as counters or sets. And they’re conflict-free, ...| Blog Index on Interpeer Project
One of the recurring conversations I’m having is on whether vessel is a Merkle DAG or Merkle Tree/Trie, and every time I have to start over with explaining that it is not. And this is a deliberate choice. In this post, I’d like to explore the differences – and this post will also kick off a mini series on how vessel and it’s sibling project wyrd together form a DAG-based conflict-free, replicated data type (CRDT) akin to a Merkle CRDT.| Blog Index on Interpeer Project
With 2023 over, and some time between now and the last update, it’s perhaps a good moment to reflect on what happened in 2023 and where the project is right now. #Achievements Last year saw the closing of our grant from Internet Society Foundation, who have been excellent partners for the past two years! I don’t think I can overstate how important this grant has been for our work.| Blog Index on Interpeer Project
I was thrilled to be on stage with the Tor Project for the 2023 edition of EmpoderaLIVE. Giorgio and I followed a strong segment from Joyce Dogniez of the Internet Society Foundation, which delved into the intersection of human rights issues and the Internet already. After Giorgio explained how the Tor project saves lives right now, my part was relatively simple – I mostly said that I want to make Tor project obsolete.| Blog Index on Interpeer Project
The recent issues with Google’s WEI proposal have provided for a few more views of this blog and website, which makes it worth diving into our work a little again. The previous post on resource access is quite old at this stage, after all. #Quick Recap Under different grants, we’ve been working on a bunch of loosely related technologies. The highlights are: Channeler – a protocol that has can switch between UDP-like lossy and TCP-like lossless modes of connection, as well as novel modes...| Blog Index on Interpeer Project
Previously, I wrote about how to use Valgrind for debugging memory issues – and today, I’d like to go into how to use the tool for profiling. As I wrote before, Valgrind is an instrumentation framework that provides a collection of tools. For profiling, we’ll look at the Callgrind tool together a GUI application called KCachegrind. As a quick historical note, the predecessor to Callgrind is called Cachegrind, and was mostly for examining CPU cache usage – but Callgrind was developed o...| Blog Index on Interpeer Project
A few days ago, I made a social media post about Google vs. the Open Web. It received some responses, so I’ll reproduce it below with some additional comments. Figure: “Open Web - Gnomedex 2008” by Randy Stewart is licensed under CC BY-SA 2.0 --- #Google is trying to kill the Open Web. Using the proposed “Web Environment Integrity” means websites can select on which devices (browsers) they wish to be displayed, and can refuse service to other devices. It binds client side software ...| Blog Index on Interpeer Project
A recent thread on social media reminded me that some of the development tools I take for granted are not widely known. Veteran game developer Martin Linklater (@Fizzychicken@mastodon.gamedev.place) asked about profiling on Linux, which prompted me to mention my favourite Valgrind, which prompted a question about its use. I offered to write up a quick tutorial on it. But thinking about it a little more, quick, introductory tutorials to the tools we use makes for a useful addition to this sect...| Blog Index on Interpeer Project
Figure: “Bucket & spade” by Dale Gillard is licensed under CC BY 2.0 The other day, I was asked by a friend what it is I’m doing with this project. He’s very much into following technological trends, but not a deeply technical person himself. That drove home yet again how hard it is to provide an “elevator pitch” summary of our work. When I speak about a “human centric” internet, what I mean is a digital place where human rights are protected, and human needs are met. Now mos...| Blog Index on Interpeer Project
This year, we were presenting at the Linux Days in Chemnitz. The talk was about how to achieve full distribution with authorization in networked systems – of course using CAProck. The slides are in English, but the presentation itself was held in German.| Blog Index on Interpeer Project
Just over a week ago, the Office of the United Nations High Commissioner for Human Rights hosted a consultation on human rights in technical standard-setting processes, which I managed to attend the first half of. I live blogged some impressions, that deserve a summary here. Speaking were human rights researches, security standards contributors, and representatives of standards organizations.| Blog Index on Interpeer Project
A few days ago, I found myself attending a pitch by the Consumer Reports Digital Lab for their Data Rights Protocol. At first glance, it’s a great idea! Give organizations a standardized interface for exercising your data rights, which means you can use a simple app to request what data is collected about you, have it deleted, etc. What’s not to love? Turns out, there are some immediate concerns, and some longer-term, more vague issues that need addressing.| Blog Index on Interpeer Project
Unfortunately, in 2023 there were no Interpeer related talks at FOSDEM – after a few years of virtual conference, FOSDEM had a large number of talk submissions to deal with, and ours did not make the cut. However, FOSDEM is not just about talks – it’s often more about the meetings in the hallways and gathering spots. And so Interpeer was still present at the conference. It won’t be useful to summarize all the different conversations at the conference. I do want to highlight one I’ve...| Blog Index on Interpeer Project
Yesterday, I found myself accidentally live-blogging some thoughts on the EU Open Source Policy Summit 2023 event organized by OpenForum Europe. I say “accidental”, because I didn’t plan on doing so, but the first post got enough interest that I continued. It’s only fair to summarize my impressions today, after the fact. I’m leaving the conference with some mixed feelings. It’s been very clear that decades of FOSS advocacy have only recently gained traction, and there is still a l...| Blog Index on Interpeer Project
#Happy New Year 2023! Is a new website a good reason for a blog post? Maybe on a slow news day. But we have not been updating you here for a while, so let’s use the change of year for a recap and update. #2022 Recap 2022 has been a very busy year for us. Our R&D focus has shifted from lower level transport protocols to information-centric networking concerns. This rounds out the overall vision of a human-centric ICN stack.| Blog Index on Interpeer Project
IETF115 in London was our first change to present some of Interpeer’s work to the IETF community – or, more precisely, to it’s sister organization, the Internet Research Task Force. On the 7th, I was invited to the Decentralized Internet Infrastructure Research Group (DINRG) to recap FOSDEM’s talk on web centralization. This was followed on the 8th in the Information-Centric Networking Research Group (ICNRG), where I spoke about the vessel container format.| Blog Index on Interpeer Project
Today, at 14:00, I went to the notary to sign the paperwork for incorporating a non-profit organization for the Interpeer Project. If you’ve gone through this process before, you know that after the notary witnessing the signing of the company articles, you then have to create an account in the entity’s name, put the initial money there, prove to the notary that you’ve done so, and only then will they register the entity properly. It’ll take some time to be operational.| Blog Index on Interpeer Project
There is an ongoing discussion on human rights on the Internet on the IRTF HRPC mailing list that I want to express an opinion on. I would also like to stress that this is not an official position of the Interpeer Project. Although we are yet small, there exists already a variety of positions amongst contributors on all kinds of topics. No, this is a purely personal opinion.| Blog Index on Interpeer Project
I was recently reminded of the fact that people use the term “peer-to-peer” to mean a variety of different things. That can make conversations on the topic difficult, as with any situation where you assume you have common ground, only to discover that is not the case. In this interlude, I want to – really quite quickly – disambiguate some things, as a kind of reference for future conversations. You don’t need to agree with me. Though if that’s the case, I’d be interested to hear...| Blog Index on Interpeer Project
February is FOSDEM month. This year, I was able to give a talk on how REST contributes to centralizing the web, and what could be done about that.| Blog Index on Interpeer Project
Previously, I’ve been writing about how to perform task delegation with a distributed authorization scheme. While that article managed to outline the principle well enough, it left a few things not yet covered. The summary was that if we find a generic scheme for treating a resource as a series of changes, then we can encrypt and authenticate each change separately, leading to a kind of distributed authorship of resources – which is what we really want in a distributed system.| Blog Index on Interpeer Project
In my previous post, I was discussing how distributed authorization might be facilitated. Today, I want to discuss what effects such authorization tokens can have if we relay them, effectively achieving delegation. Figure: “The first runner in a relay - kindergarten Sports Festival.” by MIKI Yoshihito. (#mikiyoshihito) is licensed under CC BY 2.0 Distributing authorization has the immediate effect that it (mostly) eliminates authorization servers. In practice, there always needs to be a ...| Blog Index on Interpeer Project
Whenever I don’t write much here, I feel like I’m not producing anything of value. Just to make myself feel better, I want to start with a quick update on what’s been happening. I was awarded a grant by the Internet Society Foundation for research into next generation internet technologies. This, for me, has a few major effects. First, it means I could hire some help in doing this R&D work with me. Adrian, my first freelance collaborator, is going to focus on conflict-free replicated da...| Blog Index on Interpeer Project
There’s something rotten in the state of FOSS, and it’s not the software. It’s the community – or more precisely, the communal spirit. This post deviates a little from the regular topics. I do not intend to write a lot on this topic here, unless you, dear reader, provide me with feedback that it fits your interest. Consider it an experiment while work continues on implementing the protocol suite as usually discussed here, and there are fewer technical updates to write.| Blog Index on Interpeer Project
In previous posts, I spent some time describing a protocol design for negotiating independent channels over a shared connection of sorts. That’s all well and good, but it does beg the question what purpose channels serve. In the abstract, it is just what I just wrote, a mechanism for conducting multiple parts of a larger communication in parallel, and independent of each other. But while that description is apt enough, it also leaves a lot of questions open.| Blog Index on Interpeer Project
Since I occasionally find people focused on the same kind of problem that I’m trying to tackle with this project, and I have a terrible tendency to share my thoughts informally, I figured it would be a good idea to post a kind of roadmap for the project. This isn’t going to be fixed in stone forever. But its general outline should remain more or less intact. The overall goal is to “fix” the problems of the World Wide Web by addressing the privacy and security needs of the users and by...| Blog Index on Interpeer Project
A few days ago, I managed to complete another milestone for the NGI0 grant agreement. It’s released as channeler on the Interpeer code page. In a sense, this is more of an interim update. The grant agreement covers many more milestones in this repository, and as it stands, the code is highly work in progress. But it demonstrates the basic channel establishment functionality – and while that doesn’t have any bells and whistles yet, it’s a good starting point for further iteration and r...| Blog Index on Interpeer Project
In my last post, I wrote about how REST architectural principles feed into the problem with surveillance capitalism that the world faces today. Today, I want to explore how we might approach an architecture for a better, more human centric internet. Figure: “architecture 2” by fontplaydotcom is licensed under CC BY 2.0 #Internet or Web? First, some quick disambiguation. The Interpeer Project’s aim is to provide infrastructure for a next generation human centric internet – so why focu...| Blog Index on Interpeer Project
Just as my previous FOSDEM talk, my presentation at FOSSASIA was titled “Designing a Human Centric Next Generation Internet”. Trying to learn from the previous presentation – and having less time, and adding the pressure of a live event – I tried to focus more on a future internet architecture. The benefit of that approach is that it can be done as an analysis of the web’s more-or-less-achieved REST architecture and it’s successes and failures. Reading Roy Fielding's REST Disserta...| Blog Index on Interpeer Project
Remember the early 90’s and Salt-n-Pepa? No? Well, it’s about breaking taboos around talking about important topics. In a vaguely comparable way, we software engineers have a kind of taboo on talking about REST. Let’s break that. Figure: “Rest here” by oliverkendal is licensed under CC BY 2.0 See, most of you will know what REST means, right? And the majority of my readers will be able to tell me that it stands for REpresentational State Transfer. And yet, my experience is that jus...| Blog Index on Interpeer Project
OK, so in the last post, I was getting into some channel capability flags, and how they impact handling of lost packets. The main conclusion for the purposes of that post was that we need some kind of sequence numbering in every packet, unless we just so happen to switch all reliability flags off. Saving bits is a noble goal to be sure, especially when you have WiFi induced low MTU on the path. But I’m not sure that the extra branch you have to take for one of currently nine cases is worth ...| Blog Index on Interpeer Project
In February, I was able to give a talk at FOSDEM, Europe’s premier conference on free and open source software. Entitled “Designing a Human Centric Next Generation Internet”, I tried to lay out the requirements such an Internet might have, derived from the failures of the current web. I suspect the talk was a little too unfocused, but the response was great nonetheless! It certainly helped me understand better how I need to present the Interpeer Project in future.| Blog Index on Interpeer Project
It seems as if I start every piece here with an apology for taking so long to continue writing. That’s the nature of my life right now, it seems. I’m sorry. So let’s dive right in. Last time, I was writing about how different channels interact with each other, and what that means about messaging in fairly abstract terms. I also wrote before how I’m not a big fan of negotiating protocol features, and prefer to instead iterate to a new and improved protocol faster. I’ll touch on that ...| Blog Index on Interpeer Project
As is usual these days, I don’t write here half as much as I would like to. In recent weeks, this is because I have been very busy preparing for a number of conferences and writing papers. Since they all relate in one way or another to the protocol work I have been writing about, I figure people might find them interesting. I have mentioned before that I am working part time at AnyWi Technologies B.V.. The two jobs are fairly complementary; at Interpeer, protocol design is for peer-to-peer ...| Blog Index on Interpeer Project
Since I took such a long break before my last post, I figured I should forge ahead and write them while I can. Previously, I outlined the packet envelope information we’re going to send over the wire. Today’s topic is the basic messaging framework, handshakes and some considerations on channel establishment. To recap, every packet belongs to a channel, and may contain one or more messages. In the absence of any other established channel, packets will belong to a default channel. This defa...| Blog Index on Interpeer Project
After a short hiatus imposed by a broken elbow, it’s high time for an update again. This time around, I want to focus on some basic design considerations that are derived from the requirements I explored in previous posts. The aim is to clarify some concepts, and as a result get a decent idea of the information we need to transmit in packet headers. In the previous post, I wanted to start with UDP as the base on which to build. That idea remains, but I would like to expand on this a little....| Blog Index on Interpeer Project
Following my last post in which I worked through various definitions of reliability in networking, it’s time in this post to look at the main protocol contenders, and examine how they measure up to those definitions. Let’s recap quickly with a list. Reliability can mean… Soft delivery guarantees. Hard delivery guarantees. Hard delivery guarantees along the entire path. (This wasn’t mentioned last time, but we’ll get to it.) Strict ordering of packets. (This was mentioned implicitly ...| Blog Index on Interpeer Project
In the past months, I have not written much. I pushed forward with work for the Interpeer Project. But more recently, I also started as a researcher at AnyWi Technologies, joining friends from a past job. There, we participate in public/private research projects into next generation commercial drone platforms. While both domains have a multitude of differences between them, one strong overlap exists in the need for reliable and performant networking connections over the public Internet.| Blog Index on Interpeer Project
#It’s not what you think it is. A few weeks ago, I led my connections to a single-question survey, asking what the currently most utilized distributed consensus algorithms is. This isn’t the largest group in the world, but it’s also a fairly mixed bunch: a majority is in the tech industry, but almost as many are not. Some or old guard, some entered the field only a while ago. Some are more research inclined, some more practically oriented.| Blog Index on Interpeer Project
Figure: “Bazaar, Cairo, Oct-2011” by maltman23 is licensed under CC BY-SA 2.0 #Or how Blockchain gets consensus wrong. Over twenty years ago, Eric S. Raymond wrote an essay that changed the software development world. Titled The Cathedral and the Bazaar, it outlined his experience in trying to understand and emulate the success of the Linux operating system kernel. The essay set down some observations in rules that other projects should follow for similar success.| Blog Index on Interpeer Project
Open letter initially published in French by the petites singularités association, translation by OW2 – with French original version below. To...| Interpeer Project