[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Cyber honor
Ken Landaiche writes:
[...]
> to which Jim McCoy responded:
> >Like what? When identity is "weak" then honor has no meaning...
>
> That sounded reasonable to me until Crim Tideson asked:
>
> >I've created a pseudonym and a PGP key pair for that pseudonym. ...
> >I have no intention of revealing who "me" actually is. ...
> >I want to make and keep a reputation....
>
> So honor may after all have meaning in cyberspace, as some code of
> behavior that preserves one's "reputation".
But if creating a new identity is as easy as creating a pseudonym and a PGP
key pair then everyone could create several identities, one they use for
"honorable" work and others that they use when attempting to hack in to
AT&T or rob the digital bank...the lack of a link between the pseudonymns
means that "dishonorable" pseudonyms are disposable and without a means for
attaching a negative value to a reputation the reputation system as a whole
has a major flaw.
That is not to say that a system that provides for reputations with
anonymity is impossible, but it is not possible given the tools that are
currently available on the net. If you want to take a look at a system
that would offer a workable base for a reputation system I would recomment
that you start with some of the credential systems of Chaum, Evertse, and
Damgard. This would provide a foundation of unique identities and a method
for exchanging information linked to pseudonyms without giving up user
privacy.
jim