当前位置:网站首页>The legality of IPFs / filecoin: protecting personal privacy from disclosure
The legality of IPFs / filecoin: protecting personal privacy from disclosure
2020-11-06 20:32:00 【To Lianyun】
A lot of people find out , You can click on a piece of clothing or other goods on the web , Later, we will receive a series of related advertisements , It makes people wonder : Whether they're being tracked , Whether your data is leaked ?
The present , We go online 、 Use APP The data generated is stored on the centralized server . These centralized servers have a say in our data , It may lead to the disclosure of our data without consent or authorization 、 The abuse of .
If one day , There is an error or problem with this centralized server , Then the data could be lost , It can never be restored . It's just like the one I used before APP, Later this one APP We need to reform our company , This project has no staff to maintain and upgrade regularly , Addressing error occurs directly , Before Xiaobian, the words and photos on it can't be displayed , Only dumb people can eat Coptis ...
and IPFS( Interstellar file system ) Unlike a centralized server , It's a point-to-point agreement . The difference is the way it handles files : Don't use location based addressing ( For example, domain name 、IP Address 、 File path, etc ), Instead, use content-based addressing . Will file ( Or directory ) Add to IPFS After the repository , It can be referenced by its encrypted hash .
that IPFS How is the data stored ?
When we upload a video to IPFS On the Internet , First copy the file , After that, a complete copy is stored in a server . If it is greater than 256KB, It will be fragmented asymmetric encryption , And then it's distributed to the memory of storage providers around the world .
Some of this may be in your friend's memory , It may also be stored in the United States by a blonde . This is it. IPFS One of the characteristics of : De centralization .
IPFS Let's replicate our data N+1 And keep them in different areas , If the data of an area is destroyed by human activities or natural disasters , Through data backup in other regions, all data can be recovered completely .
meanwhile , And don't worry about our data being stolen or tampered with , The encrypted data is part of the data , Can't be viewed , The person who provides storage doesn't know what's inside , This is it. IPFS Another : tamper-proof , It protects privacy better than centralized storage , Guaranteed storage in IPFS Data security on .
IPFS Compared with the current storage hard disk , It will cost less , When we need this video , We just need to ask IPFS System “ Who has this document ”, here , The searcher will find that there are several storage providers who own this file , But each provider, due to the distance of transmission or other reasons , The set transmission costs vary , thus , According to their own needs, searchers can choose the relatively convenient and less expensive one .
In terms of data transmission speed ,IPFS There are different ,IPFS It's point-to-point protocol transmission , Different from the one to many mode of centralized transmission , This avoids the cluster pressure and overload caused by centralized transmission , Reduce the chance of mistakes and crashes , More convenient , quick , guaranteed , Access loading is definitely faster than centralized http Faster in mode .
therefore IPFS It can provide space for people with storage needs , At the same time, it can also make people who have extra storage space use their own resources effectively , The heart has a direction 、 Work and gain , In order to make more people willing to contribute their own hard disk to save other people's data , There's a reward mechanism for storing data ——Filecion, It all becomes more interesting .
at present ,IPFS Still on the way to decentralized storage , Now , Its motivating layer Filecoin After the launch , Expect it to perform better .
版权声明
本文为[To Lianyun]所创,转载请带上原文链接,感谢
边栏推荐
- python100例項
- (2) ASP.NET Core3.1 Ocelot routing
- Named entity recognition in natural language processing: tanford core LP ner (1)
- What course of artificial intelligence? Will it replace human work?
- Analysis of ThreadLocal principle
- Discussion on the technical scheme of text de duplication (1)
- 【转发】查看lua中userdata的方法
- 代码生成器插件与Creator预制体文件解析
- 【ElasticSearch搜索引擎】
- html+vue.js 實現分頁可相容IE
猜你喜欢
随机推荐
Wow, elasticsearch multi field weight sorting can play like this
ado.net和asp.net的关系
Multi robot market share solution
Asp.Net Core learning notes: Introduction
Staying up late summarizes the key points of report automation, data visualization and mining, which is different from what you think
GUI engine evaluation index
Analysis of serilog source code -- how to use it
CCR coin frying robot: the boss of bitcoin digital currency, what you have to know
一篇文章教会你使用Python网络爬虫下载酷狗音乐
Using NLP and ml to extract and construct web data
PHP application docking justswap special development kit【 JustSwap.PHP ]
【應用程式見解 Application Insights】Application Insights 使用 Application Maps 構建請求鏈路檢視
What is the purchasing supplier system? Solution of purchasing supplier management platform
How to understand Python iterators and generators?
(1) ASP.NET Introduction to core3.1 Ocelot
Description of phpshe SMS plug-in
嘉宾专访|2020 PostgreSQL亚洲大会阿里云数据库专场:王涛
【:: 是什么语法?】
Xmppmini project details: step by step from the principle of practical XMPP technology development 4. String decoding secrets and message package
Kubernetes and OAM to build a unified, standardized application management platform knowledge! (Internet disk link attached)