Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yeah, I have been talking about this with people for some time - and while the idea of a box is great - and needed for the long term, a VM is ideal to begin with because it can be widely, swiftly and freely distributed.

Further, I was thinking of the following scenario for message validation - (this is just a thought experiment, so it really needs some critical examination I am not sure this even gains one anything):

You run two instances of your VM. One is run locally to you - another is hosted. When a message is sent to you from another peer - it must reach both the hosted and the local one to be opened. When both instances are online at the same time - a hash is shared of the message between both instances and the local master can trust and open the message.

When you're locally off line and a message is sent - Thus, if your locally offline - your hosted instance receives the message. When you come online - your local instance will receive the message from your hosted instance AND a hash from the senders hosted instance. If the hash from the sender matches the message hash from your hosted instance - the message is trusted and can be opened. Else it is dropped.

The problem is that all these p2p secure connections can still always be slurped.

The addresses are only within the system and one would never know which hosted instance belongs to what actual address.... (This area needs a lot more thought)




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: