Changes between Version 1 and Version 2 of Security


Ignore:
Timestamp:
2007-10-15T22:20:03Z (15 years ago)
Author:
zooko
Comment:

more Security Considerations

Legend:

Unmodified
Added
Removed
Modified
  • Security

    v1 v2  
    33This page exists so that there is one page to read to learn about the security guarantees that Tahoe is designed to provide, as well as about any current known issues that might have security consequences.
    44
    5 Except that this page isn't here yet.  I (Zooko) intend to set it up today (2007-10-15), as part of the v0.6.1 release.
     5= The Distributed Filesystem =
    66
    7 Be right back...
     7== Access Control ==
     8
     9The Tahoe distributed filesystem is composed of files and directories.  Each file has a unique and unguessable identifier, called a "CHK-URI".  Possession of this identifier is necessary and sufficient to download, reconstruct, decrypt, and verify the integrity of the file.  If a person is not given the CHK-URI, then they cannot see the
     10
     11== Traffic Analysis ==
     12
     13''To be filled in.''  Traffic analysis is subtle and powerful.  For the moment, assume that if someone wants to, they can learn everything about your every act, including when were, and which file, by its unique identifier and its length ''except'' that they can't learn the actual contents of the files, except that if the file happens to be a file whose contents they already know then they can.  Make sense?  I'll come back later.