|
- Just a conceptual sketch
of the Eternity storage service idea
- In section 2, there is an
argument about the problem of how to ensure the longevity of digital
documents. Basically the author argues that Internet will be the
"file store with a very high degree of persistence in the face
of all kinds of errors, accidents and denial of service
attacks". But, how do we know that the Internet will be around
ten or twenty years later? :)
- "Digital Coin"
is necessary for this scheme to work. We tried to find a practically
feasible way to provide anonymous electronic money, but couldn't.
Details about this will be summarized in the next paper's summary.
- The mechanism for one
Eternity server to find out the other Eternity servers is not
clearly described.
- Is there any
non-technical threats possible to Eternity service? Any possible
social-engineering attacks?
- It is possible to use the
Eternity service for a malicious purpose. For example, if someone
loads a deadly computer virus or a program that attacks arbitrary
machines in the Internet, to the Eternity service and it stays there
for 50 years compromising other systems, is it really what we want?
- The perjury trap in
section 4.4, is it legally effective method?
- Questions about
tamper-proof, tamper-resistant hardware. Is there any actual
implementation?
|