• 19 Posts
Joined 1 year ago
Cake day: June 4th, 2023


  • You may know me as a Bitcoin educator and engineer.

    Yeah well, in that case, fuck you and the hypercapitalist horse you rode in on.

    This guy is a protocol engineer, talking about protocols. You may not like like Bitcoin, but it’s pretty hard to argue it’s not one of the most successful, widely-used, and forked open source protocols developed in the last several decades. Bitcoin core is in the top 100 starred repos on Github. It has a unicode character.

    Bitcoin’s market cap (> 1 trillion USD) is bigger than Sweden’s GDP and it moves billions of dollars around the world every year. You can use it to send money to anybody with a phone and a halfway reliable internet connection in under a second for pennies in fees, and it settles instantly. And it’s been working for 15 years without a single hour of downtime, bank holiday, or hack despite pandemics, wars, financial crises, and attempted bans by global powers.

    Like, be mad if you want, but it’s a pretty successful and robust protocol. And if you don’t like it, you can fork it and change it, because it’s open source.

  • Sure, you can run one, good luck getting even a halfway decent delivery rate to mailboxes at any major mail provider. Even if they never receive a spam message from your server, your server is an “unknown” which counts against you. And if one person in your small company of 10 or 100 or even 1000 people gets their e-mail hacked and sends spam? Prepare for the rest of them to get punished for it. Running an SMTP server is a nightmare which is why, over time, more and more of the economy has just shifted their SMTP servers to organizations who professionally run SMTP servers instead of having their own.

  • It would be annoying to lose your instance, true, but you just move to another or roll your own.

    This is a problem nostr solved, and I believe bluesky solves as well though idk as much about the protocol. On nostr, your identity and your instance are different things. Relay goes down? There’s no meaningful impact to you. You’re typically connected to several, each of which store your content. You identity isn’t username@somerelay dot com, it’s just username.

    As a user, I had this happen to me early in mastodon and it was very frustrating to lose all my follows, followers, tweets, settings, etc. I realize there’s now ways to manually backup etc but properly moving an account requires a cooperative instance which can’t happen if it’s de-federated or just drops offline randomly like mine did.

    The Fediverse and ActivityPub will continue to evolve, but unlike SMTP, they were created after the internet became adversarial. This author isn’t the first to try to fearmonger over the future of AP, and they won’t be the last.

    This isn’t fearmongering, it’s him reviewing the ways SMTP tried to solve the spam problem and became centralized as a result. These questions of how we tackle spam and moderation are valid, important questions. And Fediverse, at a structural level, is basically the same as SMTP. We have users at instances (e-mail hosts), they can send messages/tweets/links (emails) to users on other instances. Each instance is free to accept/reject messages from other instances based on their own criteria. That’s the whole thing. That’s exactly how SMTP works.

  • This is an instance moderation problem. If you’re letting spammers in, you need to use a better application process or something similar to that. A big problem with email spam is that most email services allow anyone to sign up for free without any checks.

    Which is one reason, this author is arguing, that e-mail has become so centralized. Doing that kind of manual moderation and curation is expensive, the bigger instances out-compete the smaller ones who don’t have as much resources to dedicate to it. As more and more instances get “de-federated” for not having as good of anti-spam measures as the bigger instances, more users will sign up at big instances to avoid defederation risk. Just like how many people use gmail simply because their email delivery rate is so good. If I send from g-mail, there’s very few servers which will reject my message or throw it in the spam folder. I’d love to run my own mail server, but even as a dedicated sysadmin it’s impossible to get decent delivery rates.

    The more anti-spam checks we have, yes we weed out spam, but we also make it accessible to less users as well.

    AP has been blessed so far with not having to fight too much spam. Look at very popular, very centralized, very resourced platforms like Facebook, spam is still a problem on their platform despite massive resources put towards fighting it.

  • Don’t email spammers just spoof the domain or send without a domain?

    They do both, depending on the spammer and the type of spam they send. In e-mail, you have an e-mail server, you can use it to send mail to users on other e-mail servers. Each e-mail server can choose to accept or reject email from other e-mail servers based on whatever reason they want. AP/Lemmy/Mastodon is basically identical to this. I’m not sure how exactly bluesky is setup but I get the impression it’s similar. In Nostr, servers aren’t federated (each relay is seperate, if you want to send/recieve content to another user on a different relays you just talk to that relay directly instead of having “your relay” act as an intermediary), but the structure is still pretty similar.

    Nostr does have this hashcash type system (requiring proof-of-work to weed out spam), but I haven’t come across any relays that actually enforce it, it will be interesting to see if that changes in time. I also saw a GitHub issue about adding something similar to AP but I think they chose not to implement it.

  • Domains aren’t free and I don’t think it’s worth it for them to buy a new domain to just be able to spam for a short time again.

    Literally what e-mail spammers do.

    Agreed defederating can help solve obviously malicious instances, it doesn’t solve spammers abusing good instances. E-mail and AP are very similar at a protocol structure level.

  • You may want to look into Qubes, it can natively route an entire OS through Tor. Note that routing all your traffic may hurt your anonymity. For example, there what if an app on your machine reaches out to somewhere and reports the serial number of a piece of hardware and it does it through your “anonymous” Tor connection? Virtualizing that hardware can help avoid that. Think through your threat model.

  • Firstly, rich people already do this with our existing currency systems. So that has to be what we’re comparing against. And nobody has done this because there’s zero benefit to doing so.

    The thing you’re talking about is a 51% attack and the answer is:

    • The cost of doing so, which continues to increase and is around a trillion dollars currently. Even if you had the money, there are very significant logistical hurdles which make it difficult and means people would see it coming a mile away. They don’t have to buy coins, they have to buy energy and equipment to turn that energy into mining and they have to keep buying energy as long as they want their attack to continue. That trillion dollar figure is for one block worth of attack (10 minutes). The longer you attack, the more the cost per block goes up too.
    • There is no benefit to doing so. The second your attack ends, the network reverts to the true “main chain”, the system is designed to be really robust

    There are only two things you can do with a 51% attack

    • “double-spend” meaning you spend the same coins twice. But if somebody is going to trade you 1 trillion dollars of stuff, they’re going to wait for more than a few blocks confirmation. The scenarios where this makes any economic sense for anybody to attempt are basically zero.
    • Delay (censor) transactions which will go through the second your attack ends

    Even if you controlled 51% of the network you cannot:

    • Spend money you don’t have the key for
    • Increase the supply beyond 21 million coins
    • Otherwise make invalid transactions

    Because all other nodes would reject your transactions as invalid.