@k00b and me discussed creating blog posts about SN internals, for example to explain in more depth how the trust algorithm works (including examples and such). I think this would help with questions like these :)
reply
deleted by author
reply
deleted by author
reply
I believe that truly malicious people go to great lengths to achieve their goals so not having a blog post would not stop them since as you mentioned, the code is open source. Explaining how the algorithm works could just create more "opportunistic malicious" people but there shouldn't be something so obviously wrong in our algorithm that a lot of people immediately think: "wait, I can game this."
However, making code more accessible makes it easier for honest people to chime in and give feedback. So we should optimize for that imo.
That's at least what I think, I don't speak for @k00b.
reply
That's right.
I'd also add that fastest way we'll improve the algorithm's gamelessness is by helping people "play the game," observe, and correct it.
The alternative, a secret weak algorithm we hope people don't discover vulnerabilities in, is super unsatisfying to me.
reply
100 sats \ 1 reply \ @ek 16 Aug 2023
The alternative, a secret weak algorithm we hope people don't discover vulnerabilities in, is super unsatisfying to me.
Yeah but somehow, people still believe security by obscurity is a valid strategy. I think it's just intuition but maybe this is a prime example where intuition is wrong.
I would rather build everything in the open and get exploited on day 1 and then fix it than build secretly and then hope no one is going to find a single exploit.
Going from proprietary software to OSS code is a whole different topic though. I think it's hard to be confident enough in your code to release it if you built it long enough not in the open. But maybe that's another sign that security by obscurity doesn't work "at scale".
reply
deleted by author
reply
deleted by author
reply
1000%
reply