Did you know the NSA designed the IP protocol with backdoors in it to spy on you? Did you know that every time you visit a website you give it your IP address? EVERY TIME That's like every time you speak to someone you give them your home address; it's insane! We need to redesign the Internet. So give me your ideas!
If I get enough of them I'll start an open source project to implement them. The project will be FreeBSD licensed so anybody can use the code and it will spread like crazy. I decided against using the GPL as Rimmus will assuredly demand the project be called RMS/GNU/prog/net instead of just /prog/net.
So lets start. First idea: No return IP addresses in packets. If you want them to reply to something you include the address at the application layer. Second idea: All communications are encrypted. We'll make it so every address is associated with a public key that is used to encrypt data sent to it. Third idea: Any person can use any address that isn't already taken. The current system we have, where you need to purchase blocks of IP addresses from registrars is obviously designed to track you and to squeeze money from you. No longer can you look up an IP address and get the name of the person/organization who bought it.
Name:
Anonymous2015-02-24 7:53
How will we ban people from websites?
Name:
Anonymous2015-02-24 7:55
>>1 Better idea: send your MAC address instead of your IP address every time you visit a website!
Name:
Anonymous2015-02-24 7:58
>>2 On websites without user accounts you don't. Or else you do it by banning their motherboard serial number.
approach to fighting spies. Your idea will not work. Here is why it won't work. (One or more of the following may apply to your particular idea, and it may have other flaws which used to vary from state to state before a bad federal law was passed.)
(x) Spammers can easily use it to send spam (x) routing software, caching servers and client-server sessions will not handle it (x) No one will be using such unreliable protocol (x) It is defenseless against DDOS (x) It will stop spying for two weeks and then everyone stops using (x) Users of email will not put up with it (x) Microsoft will not put up with it (x) The police will not put up with it (x) Requires too much cooperation from ISPs (x) Requires immediate total cooperation from everybody at once (x) Many legacy software users cannot afford to lose business or alienate potential employers (x) Spammers don't care about invalid addresses (x) Anyone could anonymously destroy anyone else's career or business
Specifically, your plan fails to account for
(x) lack of RFCs (x) Lack of centrally controlling authority or any stable organization (x) carrier grade NAT and home routers (x) Ease of bruteforcing addresses with GPGPU computing (x) Asshats and botnets (x) Jurisdictional problems (x) Unpopularity of weird new protocols (x) Public reluctance to accept weird new forms of software (x) Huge existing software investment in IP (x) Susceptibility of protocols other than IP to flooding and MITM attacks (x) Willingness of users to install new software (x) Armies of worm riddled broadband-connected Windows boxes (x) Eternal arms race involved in all filtering approaches (x) Extreme profitability of spam (x) Joe jobs and/or identity theft (x) Technically illiterate users (x) Extreme stupidity on the part of people who do business (x) Dishonesty on the part of users themselves (x) Bandwidth costs that are unaffected by client filtering (x) Low-latency Games and the following philosophical objections may also apply:
(x) Ideas similar to yours are easy to come up with, yet none have ever been shown practical ( ) Any scheme based on opt-out is unacceptable ( ) SMTP headers should not be the subject of legislation ( ) Blacklists suck (x) Whitelists suck ( ) We should be able to talk about Viagra without being censored ( ) Countermeasures should not involve wire fraud or credit card fraud (x) Countermeasures should not involve sabotage of public networks (x) Countermeasures must work if phased in gradually (x) Sending packets should be fast (x) Why should we have to trust you and your simplistic scheme? (x) Incompatiblity with older IP stacks and legacy hardware ( ) Feel-good measures do nothing to solve the problem (x) Temporary/one-time IP addresses are cumbersome ( ) I don't want the government reading my packets (x) Killing them that way is not slow and painful enough
Furthermore, this is what I think about you:
(x) Sorry dude, but I don't think it would work. (x) This is a stupid idea, and you're a stupid person for suggesting it. ( ) Nice try, assh0le! I'm going to find out where you live and burn your house down!
Name:
Anonymous2015-02-24 8:04
>>4 But wouldn't that defeat the purpose if your isp/nsa can see that your hardware was responsible for something?
Name:
Anonymous2015-02-24 8:09
>>5 That's just like your opinion, man. I bet you work for the NSA.
Name:
Anonymous2015-02-24 8:12
>>6 No it's opt-in. You only give them your motherboard serial number if you want to. And websites that want to block people based on motherboard serial numbers can block people who opt-out. Kinda like how 4chan doesn't let people using Tor (hiding their IP) post.