|Page Name:||Project Opportunities|
Censorship Proof Data Repositories
Software package repositories, rubygems/gem, npm, nuget, and scientific data collections, for example, KEGG, and media collections like the various internet archives can be made decentralized, universal, censorship tolerant. Typosquatting(archival copy) is eliminated due to the fact that no sane person will often type in the Silktorrent package names, secure hash values, manually.
Coping with Delays in Space Communication
Due to the time it takes for a radio signal to propagate between the planet Earth and the planet Mars the Silktorrent packet based software applications will be very competitive among Earth-Mars communications applications. A citation from lwn.net article (archival copy, local copy):
...Krekel noted that Elon Musk wants to get humanity to Mars by 2026. Do we think that 41-year-old technology like TCP/IP or the 21-year-old HTTP will work on Mars? Can you call Gmail as a web app on Mars? Someone in the audience suggested that it would just take "patience" which elicited widespread laughter. Krekel said that the protocols we have will not work on Mars.
But we already have Mars on Earth in places where internet connectivity is not all that good. In 1981, there were 300 computers connected to the internet, but now there are now billions of devices in the world that are still using this phone-based model. It turns out that's not actually true, he said, some are following other models. There are communication and synchronization mechanisms that some of these devices are using to transfer data directly between them without using the internet.
Affordable Data Exchange for Passengers
The Silktorrent packet based application architecture might also be beneficial at the airline industry, where planes that pass each-other, exchange Silktorrent packets. The routes, takeoff times, speeds, landing times of planes are often times public, which means that a passanger jet on a long flight can pass a Silktorrent packet wishlist to a regional flight in mid-air, the regional flight lands before the plane at the long flight, offloads the wishlist to ground based servers, those upload the request response to another regional flight that is expected to be at the range of the long-flight plane. That kind of arrangement can compensate for the lack of satellite bandwidth for whatever reason, economic, weather, space-weather, satellite maintenance, etc. All the planning, routing, is fully automated and all airports have internet connections, WiFi-s, etc. anyways. Similar schemes can take place between trains, cars, lorries, ships. Buses and metro-trains and trams have relatively well predictable routes and schedules. Even taxis can participate. The routes of people, who use GPS-navigation at their cars are also known in advance, allowing further data packet route planning.
Social Shield for Military Computer Clusters
To make fuel last longer, aircraft, drones included, must be as light as possible. Therefore the aircraft can not carry huge computer racks. In 21. century warfare target detection is automated, including target detection by using 3D radar images. If targets are small drones and droids and 3D radar images cover whole cities, the data volume might not fit to the physically small and light on-board computers of the light aircraft. The analysis of those images might take more power than the physically light and small aircraft are capable of producing or dissipating, specially, if they need to fly stealthily without glowing in various spectrum regions. The solution is to offload the data processing part to ground vehicles, ships, satellites. The data might be relayed to huge data centers, where it is stored and processed. That makes data centers a vital military asset and if target acquisition and situational awareness depends on those data centers, it makes military sense to destroy the enemy's data centers at the very first hours of the war. On the other hand, if global economy depended on the same data centers that are being used by militaries for data acquisition, then no supermafia would dare to blow up the data centers, because no sane supermafia wants to hurt the businesses of its own tax slaves. The CIA has already used that tactic for years.