当前位置:网站首页>The legality of IPFs / filecoin: protecting personal privacy from disclosure
The legality of IPFs / filecoin: protecting personal privacy from disclosure
2020-11-06 20:32:00 【To Lianyun】
A lot of people find out , You can click on a piece of clothing or other goods on the web , Later, we will receive a series of related advertisements , It makes people wonder : Whether they're being tracked , Whether your data is leaked ?
The present , We go online 、 Use APP The data generated is stored on the centralized server . These centralized servers have a say in our data , It may lead to the disclosure of our data without consent or authorization 、 The abuse of .
If one day , There is an error or problem with this centralized server , Then the data could be lost , It can never be restored . It's just like the one I used before APP, Later this one APP We need to reform our company , This project has no staff to maintain and upgrade regularly , Addressing error occurs directly , Before Xiaobian, the words and photos on it can't be displayed , Only dumb people can eat Coptis ...
and IPFS( Interstellar file system ) Unlike a centralized server , It's a point-to-point agreement . The difference is the way it handles files : Don't use location based addressing ( For example, domain name 、IP Address 、 File path, etc ), Instead, use content-based addressing . Will file ( Or directory ) Add to IPFS After the repository , It can be referenced by its encrypted hash .
that IPFS How is the data stored ?
When we upload a video to IPFS On the Internet , First copy the file , After that, a complete copy is stored in a server . If it is greater than 256KB, It will be fragmented asymmetric encryption , And then it's distributed to the memory of storage providers around the world .
Some of this may be in your friend's memory , It may also be stored in the United States by a blonde . This is it. IPFS One of the characteristics of : De centralization .
IPFS Let's replicate our data N+1 And keep them in different areas , If the data of an area is destroyed by human activities or natural disasters , Through data backup in other regions, all data can be recovered completely .
meanwhile , And don't worry about our data being stolen or tampered with , The encrypted data is part of the data , Can't be viewed , The person who provides storage doesn't know what's inside , This is it. IPFS Another : tamper-proof , It protects privacy better than centralized storage , Guaranteed storage in IPFS Data security on .
IPFS Compared with the current storage hard disk , It will cost less , When we need this video , We just need to ask IPFS System “ Who has this document ”, here , The searcher will find that there are several storage providers who own this file , But each provider, due to the distance of transmission or other reasons , The set transmission costs vary , thus , According to their own needs, searchers can choose the relatively convenient and less expensive one .
In terms of data transmission speed ,IPFS There are different ,IPFS It's point-to-point protocol transmission , Different from the one to many mode of centralized transmission , This avoids the cluster pressure and overload caused by centralized transmission , Reduce the chance of mistakes and crashes , More convenient , quick , guaranteed , Access loading is definitely faster than centralized http Faster in mode .
therefore IPFS It can provide space for people with storage needs , At the same time, it can also make people who have extra storage space use their own resources effectively , The heart has a direction 、 Work and gain , In order to make more people willing to contribute their own hard disk to save other people's data , There's a reward mechanism for storing data ——Filecion, It all becomes more interesting .
at present ,IPFS Still on the way to decentralized storage , Now , Its motivating layer Filecoin After the launch , Expect it to perform better .
版权声明
本文为[To Lianyun]所创,转载请带上原文链接,感谢
边栏推荐
- Details of dapr implementing distributed stateful service
- 常用SQL语句总结
- (1) ASP.NET Introduction to core3.1 Ocelot
- What are the common problems of DTU connection
- python100例項
- EOS founder BM: what's the difference between UE, UBI and URI?
- 华为云微认证考试简介
- C + + and C + + programmers are about to be eliminated from the market
- 【應用程式見解 Application Insights】Application Insights 使用 Application Maps 構建請求鏈路檢視
- Behind the record breaking Q2 revenue of Alibaba cloud, the cloud opening mode is reshaping
猜你喜欢
How to understand Python iterators and generators?
百万年薪,国内工作6年的前辈想和你分享这四点
C# 调用SendMessage刷新任务栏图标(强制结束时图标未消失)
What are the criteria for selecting a cluster server?
What is the purchasing supplier system? Solution of purchasing supplier management platform
Building a new generation cloud native data lake with iceberg on kubernetes
事件监听问题
MongoDB与SQL常用语法对应表
小游戏云开发入门
事务的隔离级别与所带来的问题
随机推荐
From overseas to China, rancher wants to do research on container cloud market
It's easy to operate. ThreadLocal can also be used as a cache
Wow, elasticsearch multi field weight sorting can play like this
面试官: ShardingSphere 学一下吧
開源一套極簡的前後端分離專案腳手架
检测证书过期脚本
Free patent download tutorial (HowNet, Espacenet)
Jmeter——ForEach Controller&Loop Controller
【学习】接口测试用例编写和测试关注点
Basic principle and application of iptables
CCR coin frying robot: the boss of bitcoin digital currency, what you have to know
Kubernetes and OAM to build a unified, standardized application management platform knowledge! (Internet disk link attached)
Individual annual work summary and 2019 work plan (Internet)
C#和C/C++混合编程系列5-内存管理之GC协同
What knowledge do Python automated testing learn?
Introduction to the structure of PDF417 bar code system
Swagger 3.0 brushes the screen every day. Does it really smell good?
Discussion on the technical scheme of text de duplication (1)
Try to build my mall from scratch (2): use JWT to protect our information security and perfect swagger configuration
Application of restful API based on MVC