当前位置:网站首页>The legality of IPFs / filecoin: protecting personal privacy from disclosure
The legality of IPFs / filecoin: protecting personal privacy from disclosure
2020-11-06 20:32:00 【To Lianyun】
A lot of people find out , You can click on a piece of clothing or other goods on the web , Later, we will receive a series of related advertisements , It makes people wonder : Whether they're being tracked , Whether your data is leaked ?
The present , We go online 、 Use APP The data generated is stored on the centralized server . These centralized servers have a say in our data , It may lead to the disclosure of our data without consent or authorization 、 The abuse of .
If one day , There is an error or problem with this centralized server , Then the data could be lost , It can never be restored . It's just like the one I used before APP, Later this one APP We need to reform our company , This project has no staff to maintain and upgrade regularly , Addressing error occurs directly , Before Xiaobian, the words and photos on it can't be displayed , Only dumb people can eat Coptis ...
and IPFS( Interstellar file system ) Unlike a centralized server , It's a point-to-point agreement . The difference is the way it handles files : Don't use location based addressing ( For example, domain name 、IP Address 、 File path, etc ), Instead, use content-based addressing . Will file ( Or directory ) Add to IPFS After the repository , It can be referenced by its encrypted hash .
that IPFS How is the data stored ?
When we upload a video to IPFS On the Internet , First copy the file , After that, a complete copy is stored in a server . If it is greater than 256KB, It will be fragmented asymmetric encryption , And then it's distributed to the memory of storage providers around the world .
Some of this may be in your friend's memory , It may also be stored in the United States by a blonde . This is it. IPFS One of the characteristics of : De centralization .
IPFS Let's replicate our data N+1 And keep them in different areas , If the data of an area is destroyed by human activities or natural disasters , Through data backup in other regions, all data can be recovered completely .
meanwhile , And don't worry about our data being stolen or tampered with , The encrypted data is part of the data , Can't be viewed , The person who provides storage doesn't know what's inside , This is it. IPFS Another : tamper-proof , It protects privacy better than centralized storage , Guaranteed storage in IPFS Data security on .
IPFS Compared with the current storage hard disk , It will cost less , When we need this video , We just need to ask IPFS System “ Who has this document ”, here , The searcher will find that there are several storage providers who own this file , But each provider, due to the distance of transmission or other reasons , The set transmission costs vary , thus , According to their own needs, searchers can choose the relatively convenient and less expensive one .
In terms of data transmission speed ,IPFS There are different ,IPFS It's point-to-point protocol transmission , Different from the one to many mode of centralized transmission , This avoids the cluster pressure and overload caused by centralized transmission , Reduce the chance of mistakes and crashes , More convenient , quick , guaranteed , Access loading is definitely faster than centralized http Faster in mode .
therefore IPFS It can provide space for people with storage needs , At the same time, it can also make people who have extra storage space use their own resources effectively , The heart has a direction 、 Work and gain , In order to make more people willing to contribute their own hard disk to save other people's data , There's a reward mechanism for storing data ——Filecion, It all becomes more interesting .
at present ,IPFS Still on the way to decentralized storage , Now , Its motivating layer Filecoin After the launch , Expect it to perform better .
版权声明
本文为[To Lianyun]所创,转载请带上原文链接,感谢
边栏推荐
- Lane change detection
- WeihanLi.Npoi 1.11.0/1.12.0 Release Notes
- A brief history of neural networks
- How to demote domain controllers and later in Windows Server 2012
- 【自学unity2d传奇游戏开发】如何让角色动起来
- C語言I部落格作業03
- Staying up late summarizes the key points of report automation, data visualization and mining, which is different from what you think
- 大道至简 html + js 实现最朴实的小游戏俄罗斯方块
- Unity性能优化整理
- 只有1个字节的文件实际占用多少磁盘空间
猜你喜欢
From overseas to China, rancher wants to do research on container cloud market
MeterSphere开发者手册
Behind the first lane level navigation in the industry
What is the purchasing supplier system? Solution of purchasing supplier management platform
游戏开发中的新手引导与事件管理系统
The dynamic thread pool in Kitty supports Nacos and Apollo multi configuration centers
给字节的学姐讲如何准备“系统设计面试”
C#和C/C++混合编程系列5-内存管理之GC协同
CCR coin frying robot: the boss of bitcoin digital currency, what you have to know
Kubernetes and OAM to build a unified, standardized application management platform knowledge! (Internet disk link attached)
随机推荐
Description of phpshe SMS plug-in
Analysis of serilog source code -- how to use it
Multi robot market share solution
Asp.Net Core learning notes: Introduction
新建一个空文件占用多少磁盘空间?
事件监听问题
Installing ns-3 on ubuntu18.04
嘉宾专访|2020 PostgreSQL亚洲大会阿里云数据库专场:王涛
How to turn data into assets? Attracting data scientists
Chainlink brings us election results into blockchain everipedia
Pollard's Rho algorithm
检测证书过期脚本
【转发】查看lua中userdata的方法
【:: 是什么语法?】
Music generation through deep neural network
01. SSH Remote terminal and websocket of go language
Outsourcing is really difficult. As an outsourcer, I can't help sighing.
Jetcache buried some of the operation, you can't accept it
Will blockchain be the antidote to the global epidemic accelerating the transformation of Internet enterprises?
(2) ASP.NET Core3.1 Ocelot routing