{"id":3947,"date":"2010-05-09T11:40:11","date_gmt":"2010-05-09T16:40:11","guid":{"rendered":"http:\/\/ssgreenberg.name\/PoliticsBlog\/?p=3947"},"modified":"2010-05-09T11:40:11","modified_gmt":"2010-05-09T16:40:11","slug":"how-an-unfixed-net-glitch-could-take-down-the-internet","status":"publish","type":"post","link":"https:\/\/ssgreenberg.name\/PoliticsBlog\/2010\/05\/09\/how-an-unfixed-net-glitch-could-take-down-the-internet\/","title":{"rendered":"How An Unfixed Net Glitch Could Take Down The Internet"},"content":{"rendered":"<p>Follow <a title=\"Yahoo News story\" href=\"http:\/\/news.yahoo.com\/s\/ap\/20100508\/ap_on_hi_te\/us_tec_fragile_internet\" target=\"_blank\"><strong>this link<\/strong><\/a> to the story at Yahoo News.<\/p>\n<p>Their is a slight danger in posting this information on this blog.\u00a0 However, I think that Yahoo! is a much more widely read source than this blog is.\u00a0 So the damage is already done.<\/p>\n<p>With\u00a0 signature authenticating mechanisms already in wide use, I&#8217;d think the technology is available to solve this problem.\u00a0 I&#8217;d think that each link in the chain could have a pretty good idea of the immediate next links in the chain so that it wouldn&#8217;t have to check those links&#8217; authenticity on every message.<\/p>\n<p>The problem of the authenticity check being a single point of failure could be easily solved by making it a distributed mechanism.<\/p>\n<p>If I can think of these things, I am sure the experts trying to implement a solution have already thought of these ideas.<\/p>\n<p>Now it is a matter of getting the humans involved in the process to come to some sort of agreement.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Follow this link to the story at Yahoo News. Their is a slight danger in posting this information on this blog.\u00a0 However, I think that Yahoo! is a much more widely read source than this blog is.\u00a0 So the damage is already done. With\u00a0 signature authenticating mechanisms already in wide use, I&#8217;d think the technology [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[166],"tags":[],"class_list":{"0":"post-3947","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-stevegsposts","7":"czr-hentry"},"_links":{"self":[{"href":"https:\/\/ssgreenberg.name\/PoliticsBlog\/wp-json\/wp\/v2\/posts\/3947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ssgreenberg.name\/PoliticsBlog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ssgreenberg.name\/PoliticsBlog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ssgreenberg.name\/PoliticsBlog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ssgreenberg.name\/PoliticsBlog\/wp-json\/wp\/v2\/comments?post=3947"}],"version-history":[{"count":1,"href":"https:\/\/ssgreenberg.name\/PoliticsBlog\/wp-json\/wp\/v2\/posts\/3947\/revisions"}],"predecessor-version":[{"id":3948,"href":"https:\/\/ssgreenberg.name\/PoliticsBlog\/wp-json\/wp\/v2\/posts\/3947\/revisions\/3948"}],"wp:attachment":[{"href":"https:\/\/ssgreenberg.name\/PoliticsBlog\/wp-json\/wp\/v2\/media?parent=3947"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ssgreenberg.name\/PoliticsBlog\/wp-json\/wp\/v2\/categories?post=3947"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ssgreenberg.name\/PoliticsBlog\/wp-json\/wp\/v2\/tags?post=3947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}