In other words, distributed and federated are opposites – you can't have both – and distributed crypto-routing architectures are the ones we should invest our efforts on as none of the other approaches deliver the needed security properties. Good distributed systems take metadata-protecting measures typically by onion routing or bulk storage ( consensus, blockchain). Distributed: Computer-scientific term to describe how a computational challenge, in our case the communication of data, is spread over many relay nodes in a redundant, fail-safe and in our case content-agnostic way.Additionally, people fail to run their own servers whereby popular servers become interesting targets for intrusion. Federated: Users are hosted on specific servers of their choosing, giving those servers an augmented insight into user data and especially metadata, making those servers single points of failure while still needing to deliver data to additional servers over potentially unsafe communication links (X.509 certification is easier to man-in-the-middle). Politically favorable concerning control and censorship, but data may be located in various locations, possibly less safe than when centralized. Decentralized: There is no single entity operating the network.Centralized: A single server or a cloud-like server infrastructure operated by a single political or commercial organization or person.GLOSSARY: Some sites including Wikipedia use technical terms in not very scientific ways, so here's a definition how we mean these terms: To the threat model we elaborated for secushare. THREAT MODEL: The aims discussed on this comparison page are similar The depth at which we look at these tools, excluding several that Guarantee that our analysis is accurate and we welcome feedback toĬorrect our assertions. Recommendation, within the boundaries of our competence. Tools we are keeping it up to date as a best current practices People found this comparison useful to choose reasonable intermediate Strengths and weaknesses of many software solutions. Perspective of a developer rather than a user helps figuring out the What secushare is supposed to deliver on the day we manage to This page was originally a feature comparison of existing tools to
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |