I was just wondering what are the security measures that would be set to prevent abuse? DDos attacks for example?
If a client is looking for say 1000 computers worth of computational power, would the client and each "Seller" have to follow these steps:
-Publisher Alice puts her announcement into the blockchain, that she's seeking a defined hardware capacity.
-Provider Bob polls the blockchain looking for announcements within his capacity. Seeing Alice's announcement, Bob connects to Alice's IP address.
-Alice and Bob challenge each others' keys the key pair of their blockchain addresses to verify each others' identity.
-Bob tells Alice what hardware he has available, the two negotiate a price, and after payment is made Bob creates a virtual machine that Alice accesses over SSH.
Do the 1000 computers form a cluster acting like one supercomputer?