Ø
«
»
0 :
1 : Who ‒ The Tahoe-LAFS Project
2 : About this talk
3 : What ‒ cryptographic storage
4 : Why ‒ use cases
5 : How ‒ part 1: capabilities
6 : How ‒ part 2: mutable and immutable files
7 : How ‒ part 2: mutable and immutable files
8 : How ‒ part 2: mutable and immutable files
9 : How ‒ part 2: mutable and immutable files
10 : How ‒ part 2: mutable and immutable files
11 : How ‒ part 3: erasure coding
12 : How ‒ part 3: erasure coding
13 : How ‒ putting it all together
14 : How ‒ putting it all together
0
/
14
Press space bar or down key to proceed to the next slide.
Who ‒ The Tahoe-LAFS Project
Brian Warner, Zooko Wilcox-O'Hearn, David-Sarah Hopwood, and many more
https://tahoe-lafs.org
https://LeastAuthority.com
About this talk
Tahoe-LAFS crypto design
things you might be able to do with this information:
definitions (e.g. Ristenpart et al. 2013)
proofs
variants with better security and performance
extensions with new features from our wishlist
implement it!
What ‒ cryptographic storage
network-and-reliance-topology.svg
Why ‒ use cases
backup …with
“provider-independent security”
file-sharing
censorship-resistant hosting?
decentralized web apps‽ …e.g. “TiddlyWiki”
How ‒ part 1: capabilities
start with a cap
location/routing
integrity/file identity
access control
How ‒ part 2: mutable and immutable files
mut-and-imm-1.svg
How ‒ part 2: mutable and immutable files
mut-and-imm-3.svg
How ‒ part 2: mutable and immutable files
mut-and-imm-4.svg
How ‒ part 2: mutable and immutable files
mut-and-imm-5.svg
How ‒ part 2: mutable and immutable files
mut-and-imm-6.svg
How ‒ part 3: erasure coding
erasure-encoding.svg
How ‒ part 3: erasure coding
erasure-decoding.svg
How ‒ putting it all together
overall.svg
How ‒ putting it all together
overall-2.svg