Online: | |
Visits: | |
Stories: |
Story Views | |
Now: | |
Last Hour: | |
Last 24 Hours: | |
Total: |
Postmasters, of course, will be able to communicate through this network between themselves and share information. In this way, they will know the health of the network in various areas. They will be the first ones with the most knowledgeable about encryption and programs that are available. At first, many Postmasters may not know much about encryption or how to use the tools, but they can learn about it and even share copies of the software through the network. As soon as most Postmasters have mastered it, they can start providing encryption as a service across the network.
If the network gets overloaded, they can set up subnetworks to take some of the load. They can help set up private networks for groups that need them, using separate pouches if necessary but sharing the same protocols, transfer routes, and personnel. As with almost anything, there is always a danger of politicization, which much be guarded against.
An important duty of all Postmasters, and actually anyone using the network, is to be alert for sabotage and do everything possible to prevent it and minimize any damage.
One simple way for the system to be sabotaged would be for some “Evil Postmaster” to intentionally make some alteration on the contents of all files in his pouch, rendering them useless, and then to transfer the pouch to other Postmasters. Any of the files that had already existed in their unaltered state on other Postmasters’ pouches would be okay, because existing files are not overwritten during the swapping protocol, but any files that were only in the “Evil Postmaster’s” pouch and any that are new to the other Postmasters would be passed on in their corrupted state. This could be detected quickly by other Postmasters, if they were in the habit of sending encrypted messages between themselves, because they would discover the corruption of their messages. Once detected, they could make an effort to quarantine the corrupted files by not passing them on.
In a more advanced scenario, once Postmasters have become more experienced, they would be able to proactively detect corrupted files by using specialized software to compare the contents of messages with the same filename. Unless files have been intentionally corrupted, the contents will be identical except in very unusual cases. In this case, it may be possible to detect that the files have been corrupted but not possible to tell which of the two copies is the “real one”. In this case, both the good one and the bad one can be passed on if the postmaster adds an additional character to the end of the filename. The receiver will then have to determine which one is right. If he has used encryption, this will be easy, because only the real one will decrypt successfully.
In general, Postmasters should have a good understanding of how the network operates and be on the lookout for problems. When a pouch comes in from another community, he should know what to expect in terms of the quantity of new messages.
Source: http://survivalblog.com/internet-without-infrastructure-part-5-by-r-h/