I see one possible future is analogous to TCP between consenting
parties, and UDP between non-consensual ones. Consenting parties tent
not to mind to know each other (usually) and with non-consensual ones
the receiver should not have to be known to exist. Your scheme
requires that.
Ahh, use pseudo-UDP for initial contact and pseudo-TCP for exchanges
among friends, with promotion or degradation across barrier being
controlled by that end of the pipe... Cute. That rather requires
building in double-blind anonymous operation at the core...
Not double-blind. Half-blind. If you send me something, I want to know who
sent it, and that is a legit request. By sending me something you enter a
"contract" where in you forfeit your right* to anoniminity in order to be
able to send me something.
We could construct a double blind system for the sake of complexity, but I'd
filter all non-identifiable messages to the bit bucket. I think most
everyone else would too, unless they want to get those mysterious anonymous
messages that we see in movies... Follow the white rabbit Neo.
-J
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg