Web-based trust-how do I know that web-based people will not attack me?

Source: Internet
Author: User

From: http://mmdays.wordpress.com/2007/03/30/trust/

 

Posted by mr. Friday

Today, the main topic we want to address is the trust mechanism of the network. Trust: Trust. The role of San has cloud: "No one can believe it .」 Since ancient times, trust is ....... (Pull xd)

 

Let's pull back to the topic. Today's main topic is "How to trust others on the Internet ?」 -Or, who should I trust? . When we initiate online transactions, the first thought is: "Can we trust online transactions ?」 There are a lot of people from the Internet industry who are afraid of this kind of problem because they are engaged in technical defense. This is of course an important issue, but in practice, the security of web transactions is not only in the anti-DDoS attacks such as "website attacks will not be heard", but "website attacks will not be blocked ". sexual danger, another question that is easier to ignore than others, but more importantly, is: "How do I know that people on the Internet will not attack me? 」

 

「 How do I know that people on the internet won't beat me 」How important? You can see the new shard. Open the TV and compile the program, in fact, the proportion of new customers who have been added to their online credit card passwords is better than that of "girls who have been rejected by their online friends" and "female fear of surfing the Internet, there are fewer otaku and baishu. The acquisition of technical skills may be easier than anti-attack, but the trust between people seems to be more important, and the lack of technical skills is more important. There is a well-known question in mathematics, called the question of the upcoming rise of Byzantine Law, which is about the crisis of trust between people. The Byzantine position is in the Istanbul region of Turkey today. It is the capital of eastern Malaysia, so eastern Malaysia also belongs to the Byzantine Empire. Since the country is an emperor, although some employees are absent, every batch of workers in the future are very separated, and each other can only rely on message delivery. During the battle, we must make them a consistent consensus: advance or retreat. However, unfortunately, there will be traitors (unknown numbers of people) in these plans, and their purpose is to adjust the overall order of these ideas. At this time, a problem arises: how can he establish a consensus when he or she is loyal to him, not influenced by traitors? This isByzantine issues.

 

The original definition of the Byzantine question includes a commander and several lieutanent deputies, which issue commands to the deputy officers. There are two requirements for the topic. The first is agreement: all loyal people are most likely to have the same idea (whether or not the idea is true or not ). The second is validity: if the primary officer is loyal, all the secondary officers of the primary school will follow the command of the secondary school officer. There is no fixed solution to the Byzantine issue: it is a problem that can be used to verify the validity of a machine. If there is a method that can solve "a maximum of 1/3 million accounts", it is better than the method that can solve "a maximum of 1/4 million accounts. In fact, there are also many variants in the Byzantine issue, including distributed.
Consensus (an idea for each person, followed by a suggestion) and interactive consistency (where each person makes an opinion, and then each person makes a clear statement, remember the opinions of every person you hear, and the final orders must be the same ).

 

In many aspects of life, we can see the shadows of Byzantine issues, but this issue is especially important on the Internet. Some traditional media have the permission to speak in a small number of people, and the network is a platform for everyone to share and share anonymous features at the same time, it is easy to provide information, but the certificate is used to verify who is talking about it. These features are similar to the design of the Byzantine issue, so the research on the Byzantine issue is also widely used in Distributed Multi-engineering systems and web applications. For example, how do you believe that the case shared by someone on eMule is false? In a discussion, is it true that someone says something? In the past, the solution to the Byzantine issue gradually changed into a real machine on the network. For example, if someone else could not copy it, the real name would become private/public.
Key and digital floating watermarks, a trusted third party becomes a web tracking website, and one of the most common websites is now:Web push mechanism.

 

The online shooting line is the best practice of this kind of machine. Is it worthwhile for everyone to believe that a family is on duty? Each individual tests others' opinions on the home, and finally decides "believe" or "Don't believe". Isn't this the aforementioned "distributed consensus" question? Taking Chimo pattern as an example, the reason why many people are listed at the bottom is that I believe it should all be the small "nickname" next to the family name. How can this batch data come from? It relies on the reputation of the customers who have been dealing with the company. The better the word of mouth, the higher your reputation, the more you can make other companies "trust" your family, and create a higher sales volume, and then create a better sales volume. This mechanism is written as "reputation
Model, straight forward is the "look-at model 」.

 

Do not think the reputation model is just like eBay or Yahoo! The camera is just a sub-mechanism. In fact, the two website's look-at model is still the most simple one. Technically speaking, not sound. One of the network features is anonymous. A person can access Yahoo! There are a lot of marketing ideas on the camera, so you will see someone building their own products, which is very expensive, however, the quality of services is poor. Furthermore, a store has been in service for many years and has established a good reputation. However, one day, he suddenly stepped into the electronics industry to launch a refrigerator, in this case, can the store successfully marry new products? If the refrigerator isn't ideal, should the home computer be retained in the service industry? Ignoring multiple roles (in a certain region, they are family members, but in a certain region, they are outsiders), although they are also eBay, Yahoo! .

Trust and reputation models have been discussed in the academic field in recent years. There are a lot of arguments (including information science, psychology, and social engineering domains) to explore trust issues and solutions in various situations, for example, Google
PageRank, root user's transaction process, or credit calculation, calculate the eigentrust and peertrust of each person's global trust score, the foaf-realm is calculated based on your friend's tweets... And so on. Some community websites are even inspired by trust to attract friends: trust your friends' opinions!
Trusted opinion.com/

 

Introducing so many trust mechanisms on the internet, do you feel a little relieved about the Internet? However, the author is here to make everyone feel cold, just as people have always been trusting others for thousands of years, and it is perfect to have no trust mechanism. With a more robust tracing tool, it may reduce the number of masked images in the form of an anonymous website, helping people make decisions faster, however, we should be more aware of the use of these cutting-edge tools. They have good tools and are absolutely irrelevant, in the world, there is no exactly-designed failover mechanism, just as a person is a good person or even has no experience in his own mind. Should I rely entirely on the evaluation tool to calculate the evaluation or the evaluation as a test? Believe it or decide whether your rights are in your hands!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.