James 💐
    • Create new note
    • Create a note from template
      • Sharing URL Link copied
      • /edit
      • View mode
        • Edit mode
        • View mode
        • Book mode
        • Slide mode
        Edit mode View mode Book mode Slide mode
      • Customize slides
      • Note Permission
      • Read
        • Only me
        • Signed-in users
        • Everyone
        Only me Signed-in users Everyone
      • Write
        • Only me
        • Signed-in users
        • Everyone
        Only me Signed-in users Everyone
      • Engagement control Commenting, Suggest edit, Emoji Reply
    • Invite by email
      Invitee

      This note has no invitees

    • Publish Note

      Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note

      Your note will be visible on your profile and discoverable by anyone.
      Your note is now live.
      This note is visible on your profile and discoverable online.
      Everyone on the web can find and read all notes of this public team.
      See published notes
      Unpublish note
      Please check the box to agree to the Community Guidelines.
      View profile
    • Commenting
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
      • Everyone
    • Suggest edit
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
    • Emoji Reply
    • Enable
    • Versions and GitHub Sync
    • Note settings
    • Note Insights New
    • Engagement control
    • Make a copy
    • Transfer ownership
    • Delete this note
    • Save as template
    • Insert from template
    • Import from
      • Dropbox
      • Google Drive
      • Gist
      • Clipboard
    • Export to
      • Dropbox
      • Google Drive
      • Gist
    • Download
      • Markdown
      • HTML
      • Raw HTML
Menu Note settings Note Insights Versions and GitHub Sync Sharing URL Create Help
Create Create new note Create a note from template
Menu
Options
Engagement control Make a copy Transfer ownership Delete this note
Import from
Dropbox Google Drive Gist Clipboard
Export to
Dropbox Google Drive Gist
Download
Markdown HTML Raw HTML
Back
Sharing URL Link copied
/edit
View mode
  • Edit mode
  • View mode
  • Book mode
  • Slide mode
Edit mode View mode Book mode Slide mode
Customize slides
Note Permission
Read
Only me
  • Only me
  • Signed-in users
  • Everyone
Only me Signed-in users Everyone
Write
Only me
  • Only me
  • Signed-in users
  • Everyone
Only me Signed-in users Everyone
Engagement control Commenting, Suggest edit, Emoji Reply
  • Invite by email
    Invitee

    This note has no invitees

  • Publish Note

    Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note

    Your note will be visible on your profile and discoverable by anyone.
    Your note is now live.
    This note is visible on your profile and discoverable online.
    Everyone on the web can find and read all notes of this public team.
    See published notes
    Unpublish note
    Please check the box to agree to the Community Guidelines.
    View profile
    Engagement control
    Commenting
    Permission
    Disabled Forbidden Owners Signed-in users Everyone
    Enable
    Permission
    • Forbidden
    • Owners
    • Signed-in users
    • Everyone
    Suggest edit
    Permission
    Disabled Forbidden Owners Signed-in users Everyone
    Enable
    Permission
    • Forbidden
    • Owners
    • Signed-in users
    Emoji Reply
    Enable
    Import from Dropbox Google Drive Gist Clipboard
       Owned this note    Owned this note      
    Published Linked with GitHub
    • Any changes
      Be notified of any changes
    • Mention me
      Be notified of mention me
    • Unsubscribe
    # Chapter 15: Reputations and Credentials From [THE CYPHERNOMICON](/EwKg3ncCT0S_y21YhJGzOg) --- [toc] --- # 15. Reputations and Credentials ## 15.1. copyright THE CYPHERNOMICON: Cypherpunks FAQ and More, Version 0.666, 1994-09-10, Copyright Timothy C. May. All rights reserved. See the detailed disclaimer. Use short sections under "fair use" provisions, with appropriate credit, but don't put your name on my words. ## 15.2. SUMMARY: Reputations and Credentials ### 15.2.1. Main Points - "a man's word is his bond" - reputations matter - the expectation of future interaction/business is crucial ### 15.2.2. Connections to Other Sections - see section on Crypto Anarchy for why reputations matter ### 15.2.3. Where to Find Additional Information - very little published on this - Bruce Benson's "The Enterprise of Law" ### 15.2.4. Miscellaneous Comments - this is another "transition" chapter, laying the groundwork for Crypto Anarchy ## 15.3. The Nature of Reputations ### 15.3.1. The claim by many of us that "reputations" will take care of many problems in crypto anarchic markets is disputed by some (notably Eric Hughes). To be sure, it will not be a trivial issue. Institutions take years or decades to evolve. ### 15.3.2. However, think of how often we use reputations: friends, books, movies, restaurants, etc ### 15.3.3. Reputations and other institutions will take time to evolve. Saying "the market will talke care of things" may be true, but this may take time. The "invisible hand" doesn't necessarily move swiftly. ### 15.3.4. "What are 'reputations' and why are they so important?" - a vague concept related to degree of believability, of trust, etc. + "we know it when we see it" - (sorry for the cop out, but I don't have a good definition handy...James Donald says studying reputatons is "nominalist hot air" [1994-09-02], but I think it's quite important) + obvious, in ordinary life, but in the cyberspatial context - reputation-based systems - escrow, expectations - "reputation capital" - like book or music recommendations - web of trust (is different than just "trust"---tensor, rather than scalar) + Actually very common: how most of us deal with our friends, our enemies, the books we read, the restaurants we frequent, etc. - we mentally downcheck and upcheck on the basis of experience; we learn - Are there examples? - Eric's objections ### 15.3.5. "How are reputations acquired, ruined, transferred, etc.?" + First, reputations are not "owned" by the person to whom they are attached by others + the algebra is tricky...maybe Eric Hughes or one of the other pure math types can help straighten out the "calculus of reputations" - reputations are not symmetric: just because Alice esteems Bob does mean the reverse is so - reputations are not transitive, though they are partially transitive: if Alice esteems Bob and Bob esteems Charles, this may cause Alice to be somewhat more esteemful of Charles. - a tensor matrix? - a graph? + Any holder of a reputation can "spend" some of his reputation capital - in praise or criticism of another agent - in reviews (think of Siskel and Ebert "spending" some of their reputation capital in the praise of a movie, and how their own reptutations will go up and down as a function of many things, including especially how much the viewing audience agrees with them) ### 15.3.6. "Are they foolproof? Are all the questions answered?" - Of course not. - And Eric Hughes has in the past said that too much importance is being invested in this idea of reputations, though many or even most of us (who comment on the matter) clearly think otherwise. - In any case, much more study is needed. Hal Finney and I have debated this a couple of times (first on the Extropians list, then a couple or more times on the Cypherpunks list), and we are mostly in agreement that this area is very promising and is deserving of much more thought--and even experimentation. (One of my interests in crypto simulations, in "protocol ecologies," is to simulate agents which play games involving reputations, spoofing, transfers of reputations, etc.) ### 15.3.7. Reputations have many aspects + the trading firm which runs others people's money is probably less "reputable" in an important sense than the trading firm in which partners have their own personal fortunes riding...or at least I know which one I'd trust! - (But how to guarantee one isn't being fooled, by a spoof, a sham? Hard to say. Perhaps the "encrypted open books" protocol Eric Hughes is working on will be of use here.) ## 15.4. Reputations, Institutions ## 15.5. Reputation-Based Systems and Agoric Open Systems ### 15.5.1. Evolutionary systems and markets + markets, emergent order, Hayek, connectionism - many related ideas...spontaneous order, self interest, agents, etc. + a critique of "blind rationalism" - or hyperrationalism, the idea that a form model can always be found - order can develop even in anonymous systems, provding certain types of contacts are established, certain other things ### 15.5.2. shell games...who knows what? ### 15.5.3. key is that would-be "burners" must never know when they are actually being tested - with devastating effects if they burn the tester + example: how to guarantee (to some degree of certainty) that an anonymous bank is not renegging (or whatever)? - e.g., a Swiss bank that denies knowledge of an account - key is that bank never know when a withdrawal is just a test (and these tests may be done frequently) - the importance of repeat business ### 15.5.4. another key: repeat business...when the gains from burning someone are greater than the expected future business... ### 15.5.5. reputations are what keep CA systems from degenerating into flamefests - digital pseudonyms mean a trail is left, kill files can be used, and people will take care about what they say - and the systems will not be truly anonymous: some people will see the same other people, allowing the development of histories and continued interactions (recall that in cases where no future interaction is exected, rudeness and flaming creeps in) + "Rumormonger" at Apple (and elsewhere) always degenerates into flames and crudities, says Johann Strandberg - but this is what reputations will partly offset ### 15.5.6. "brilliant pennies" scam ### 15.5.7. "reputation float" is how money can be pulled out of the future value of a reputation ### 15.5.8. Reputation-based systems and repeat business + reputations matter...this is the main basis of our economic system - repeat business...people stop doing business with those they don't trust, or who mistreat them, or those who just don't seem to be reputable - and even in centrally-controlled systems, reputations matter (can't force people to undertake some relations) - credit ratings (even for pseudonyms) matter - escrow agents, bonding, etc. - criminal systems still rely on reputations and even on honor - ironically, it is often in cases where there are restrictions on choice that the advantages of reputations are lost, as when the government bans discrimination, limits choice, or insists on determining who can do business with who + Repeat business is the most important aspect - granularity of transactions, cash flow, game-theoretic analysis of advantages of "defecting" - anytime a transaction has a value that is very large (compared to expected future profits from transactions, or on absolute basis), watch out - ideally, a series of smaller transactions are more conducive to fair trading...for example, if one gets a bad meal at a restaurant, one avoids that restaurant in the future, rather than suing (even though one can claim to have been "damaged") - issues of contract as well ## 15.6. Reputations and Evolutionary Game Theory ### 15.6.1. game of "chicken," where gaining a rep as tough guy, or king of the hill, can head off many future challenges (and hence aid in survival, differential reproduction) ## 15.7. Positive Reputations ### 15.7.1. better than negative reputations, because neg reps can be discarded by pseudonym holdes (neg reps are like allowing a credit card to be used then abandoned with a debt on it) ### 15.7.2. "reputation capital" ## 15.8. Practical Examples ### 15.8.1. "Are there any actual examples of software-mediated reputation systems?" - credit databases...positive and negative reputations ### 15.8.2. Absent laws which ban strong crypto (and such laws are themselves nearly unenforceable), it will be essentially impossible to stop anonymous transactions and purely reputation-based systems. - For example, Pr0duct Cypher and Sue D. Nym will be able to use private channels of their own choosing (possibly using anonymous pools, etc.) to communicate and arrange deals. If some form of digital cash exists, they will even be able to transfer this cash. (If not, barter of informations, whatever.) - So, the issues raised by Hal Finney and others, expressing doubts about the adequacy of reputation capital as a building block (and good concerns they are, by the way), become moot. Society cannot stop willing participants from using reputation and anonymity. This is a major theme of crypto anarchy: the bypassing of convention by willing participants. + If Alice and Bob don't care that their physical identies are unknown to each other, why should we care? That is, why should society step in and try to ban this arrangement? - they won't be using "our" court systems, so that's not an issue (and longer term, PPLs will take the place of courts, many of us feel) - only if Alice and Bob are counting on society, on third parties to the transaction, to do certain things, can society make a claim to be involved - (A main reason to try to ban anonymity will be to stop "bad" activities, which is a separate issue; banning of "bad" activity is usually pointless, and leads to repressive states. But I digress.) ### 15.8.3. Part of the "phase change": people opt out of the permissionslip society via strong crypto, making their own decisions on who to trust, who to deal with, who to make financial arrangements with + example: credit rating agencies that are not traceable, not prosecutable in any court...people deal with them only if they think they are getting value for their money - no silly rules that credit rating data can "only" go back some arbitrary number of years (7, in U.S.)...no silly rules about how certain bankruptcies "can't" be considered, how one's record is to be "cleared" if conditions are met, etc. - rather, all data are considered...customer decides how to weight the data...(if a customer is too persnickety about past lapsed bills, or a bad debt many years in the past, he'll find himself never lending any money, so the "invisible hand" of the free market will tend to correct such overzealousnesses) + data havens, credit havens, etc. (often called "offshore data havens," as the current way to do this would be to locate in Caymans, Isle of Man, etc.) - but clearly they can be "offshore in cyberspace" (anonymous links, etc.) ## 15.9. Credentials and Reputations ### 15.9.1. debate about credentials vs. reputations - James Donald, Hal Finney, etc. - (insert details of debate here) ### 15.9.2. Credentials are not as important as many people seem to think - "Permisssion slips" for various behaviors: drinking age, admission to movie theaters, business licenses, licenses to drive taxicabs, to read palms (yes, here in Santa Cruz one must have a palm-reading license, separate from the normal "business license") + Such credentials often are inappropriate extensions of state power into matters which only parents should handle - underage drinking? Not my problem! Don't force bars to be babysitters. - underage viewing of movies? Ditto, even more so. ### 15.9.3. Proving possession of some credential ## 15.10. Fraud and False Accusations ### 15.10.1. "What if someone makes a false accusation?" - one's belief in an assertion is an emergent phenomenon + assertion does not equal proof - (even "proof" is variable, too) - false claims eventually reflect on false claimant ### 15.10.2. Scams, Ponzi Schemes, and Oceania + Scams in cyberspace will abound - anonymous systems will worsen the situaion in some ways, but perhaps help in other ways - certainly there is the risk of losing one's electronic cash very quickly and irretrievably (it's pretty far gone once it's passed through several remailers) - conpersons (can't say "con men" anymore!) will be there, too + Many of you will recall the hype about "Oceania," a proposed independent nation to be built on concrete pontoons, or somesuch. People were encouraged to send in donations. Apparently the scheme/scam collapsed: + "It turned out to all be a scam, actually. The key people involved, Eric Kline and Chuck Geshlieder, allegedly had a scheme set up where they repeatedly paid themselves out of all of the proceeds." [anonymous post, altp.privacy, (reprint of Scott A. Kjar post on Compuserve), 1994-07-28] - or was it Eric Klein? ## 15.11. Loose Ends ### 15.11.1. Selective disclosure of truth - More euphemestic than "lying." - Consider how we react when someone asks us about something we consider overly personal, while a friend or loved one may routinely ask such questions. - Is "personal" the real issue? Or is that we understand truth is a commodity with value, to be given out for something in return? - At one extreme, the person who casually and consistently lies earns a poor reputation--anyone encountering them is never certain if the truth is being told. At the other extreme, the "always honest" person essentially gives too much away, revealing preferences, plans, and ideas without consideration. - I'm all for secrets--and lies, when needed. I believe in selective disclosure of the truth, because the truth carries value and need not be "given away" to anyone who asks. ### 15.11.2. Crytography allows virtual networks to arrange by cryptographic collusion certain goals. Beyond just the standard "cell" system, it allows arrrangements, plans, and execution. - collecting money to have someone killed is an example, albeit a distasteful one # [Chapter 16: Crypto Anarchy ](/5GudvcGsTWSAUPiKObOCxA)

    Import from clipboard

    Paste your markdown or webpage here...

    Advanced permission required

    Your current role can only read. Ask the system administrator to acquire write and comment permission.

    This team is disabled

    Sorry, this team is disabled. You can't edit this note.

    This note is locked

    Sorry, only owner can edit this note.

    Reach the limit

    Sorry, you've reached the max length this note can be.
    Please reduce the content or divide it to more notes, thank you!

    Import from Gist

    Import from Snippet

    or

    Export to Snippet

    Are you sure?

    Do you really want to delete this note?
    All users will lose their connection.

    Create a note from template

    Create a note from template

    Oops...
    This template has been removed or transferred.
    Upgrade
    All
    • All
    • Team
    No template.

    Create a template

    Upgrade

    Delete template

    Do you really want to delete this template?
    Turn this template into a regular note and keep its content, versions, and comments.

    This page need refresh

    You have an incompatible client version.
    Refresh to update.
    New version available!
    See releases notes here
    Refresh to enjoy new features.
    Your user state has changed.
    Refresh to load new user state.

    Sign in

    Forgot password

    or

    By clicking below, you agree to our terms of service.

    Sign in via Facebook Sign in via Twitter Sign in via GitHub Sign in via Dropbox Sign in with Wallet
    Wallet ( )
    Connect another wallet

    New to HackMD? Sign up

    Help

    • English
    • 中文
    • Français
    • Deutsch
    • 日本語
    • Español
    • Català
    • Ελληνικά
    • Português
    • italiano
    • Türkçe
    • Русский
    • Nederlands
    • hrvatski jezik
    • język polski
    • Українська
    • हिन्दी
    • svenska
    • Esperanto
    • dansk

    Documents

    Help & Tutorial

    How to use Book mode

    Slide Example

    API Docs

    Edit in VSCode

    Install browser extension

    Contacts

    Feedback

    Discord

    Send us email

    Resources

    Releases

    Pricing

    Blog

    Policy

    Terms

    Privacy

    Cheatsheet

    Syntax Example Reference
    # Header Header 基本排版
    - Unordered List
    • Unordered List
    1. Ordered List
    1. Ordered List
    - [ ] Todo List
    • Todo List
    > Blockquote
    Blockquote
    **Bold font** Bold font
    *Italics font* Italics font
    ~~Strikethrough~~ Strikethrough
    19^th^ 19th
    H~2~O H2O
    ++Inserted text++ Inserted text
    ==Marked text== Marked text
    [link text](https:// "title") Link
    ![image alt](https:// "title") Image
    `Code` Code 在筆記中貼入程式碼
    ```javascript
    var i = 0;
    ```
    var i = 0;
    :smile: :smile: Emoji list
    {%youtube youtube_id %} Externals
    $L^aT_eX$ LaTeX
    :::info
    This is a alert area.
    :::

    This is a alert area.

    Versions and GitHub Sync
    Get Full History Access

    • Edit version name
    • Delete

    revision author avatar     named on  

    More Less

    Note content is identical to the latest version.
    Compare
      Choose a version
      No search result
      Version not found
    Sign in to link this note to GitHub
    Learn more
    This note is not linked with GitHub
     

    Feedback

    Submission failed, please try again

    Thanks for your support.

    On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?

    Please give us some advice and help us improve HackMD.

     

    Thanks for your feedback

    Remove version name

    Do you want to remove this version name and description?

    Transfer ownership

    Transfer to
      Warning: is a public team. If you transfer note to this team, everyone on the web can find and read this note.

        Link with GitHub

        Please authorize HackMD on GitHub
        • Please sign in to GitHub and install the HackMD app on your GitHub repo.
        • HackMD links with GitHub through a GitHub App. You can choose which repo to install our App.
        Learn more  Sign in to GitHub

        Push the note to GitHub Push to GitHub Pull a file from GitHub

          Authorize again
         

        Choose which file to push to

        Select repo
        Refresh Authorize more repos
        Select branch
        Select file
        Select branch
        Choose version(s) to push
        • Save a new version and push
        • Choose from existing versions
        Include title and tags
        Available push count

        Pull from GitHub

         
        File from GitHub
        File from HackMD

        GitHub Link Settings

        File linked

        Linked by
        File path
        Last synced branch
        Available push count

        Danger Zone

        Unlink
        You will no longer receive notification when GitHub file changes after unlink.

        Syncing

        Push failed

        Push successfully