Fraud, Network Trust Algorithms
TOOD(aviv):
trust network algorithms are an active, interesting area of research
Nerd'ster uses a simple, greedy, breadth first search to find trusts and blocks.
additionally, it can restrict trust to keys that are trusted via 2 (or more) independent, non-overlapping, paths. This means that 1 (or more) bad actor(s) cannot introduce bad actors into your network.
The app shows notifications in case there conflicts are encoutered in building your network (eg. two trusted people block each other). Net maintenance is up to us - call someone and figure out who's the fraud.
The ONE-OF-US.NET app issues specific trust statements trust, block, replace. These are aggregated by the Nerd'ster as described above, but they could be aggregated differently by different services. Additionally, other services could introduce their own identity statements, such as "suspect" or "recognize", for example.
The "previous" chain is to detect fraudulent backdated statements.
Revoking or replacing a key. There is a mechanism in place (read the code). You revoke or replace a key at a moment in time which you specify by referencing the replaceAt statement. This related to the the "previous" chain to prevent backdating.