►
From YouTube: How IPFS Works - Steven Allen
Description
In his introduction to how IPFS works (approximately) Steven Allen gives us an overview of IPFS and what you need to know. As a core developer of IPFS, Steven has been a long-time contributor to the project.
For more information on IPFS
- visit the project website: https://ipfs.io
- or follow IPFS on Twitter: https://twitter.com/IPFS
Sign up to get IPFS news, including releases, ecosystem updates, and community announcements in your inbox, each Tuesday: http://eepurl.com/gL2Pi5
A
Okay,
so,
first
of
all
your
reviews,
I
give
us
you
probably
see
in
this
screen.
Let's
say:
you're
a
pilot.
A
professor,
just
runs
command,
get
very,
very
end.
You
see
this.
They
call
to
see
I
need
to
contact
points
to
file
you've,
probably
seen
it
in
a
path
with
this
we're
gonna
gate,
we're
URL,
you
didn't
get
files
by
reading
again
command.
A
Okay,
this
hawk
is
going
to
cover
how
we
import
files,
name
files,
find
files
and
then
fetch
files.
The
network,
when
your
important
file
is
there
a
bunch
of
steps.
One
is
to
chunk
the
file
in
smaller
pieces.
One
is
then
take
these
pieces
and
like
actually
compiling
files
and
directories
and
then
find
that
we
encode
these
files
and
Directory
objects
in
a
data
storage
system
called
IP
LD.
Then,
when
naming.
A
Use
GNU
and
continent
needs
to
actually
refer
to
the
pieces
of
data.
We
use
paths
to
describe
extra
metadata
about
this,
about
these
user
data,
we're
dressing
as
if
we
have
another
simplified
DNS
for
immutable
names.
So
a
cover
this
bit
later,
but
you
know
because
all
content
is
addressed
by
cache,
and
that
means
you
can't
change
the
content.
So
we
could
system
for
energy
like
we.
A
Of
content
and
everyone
change,
the
contents
would
usually
go
copy
up
right
next,
you
actually
find
the
content
in
this
involves
some
overcrowding
or
content
routing.
We
use
it
the
used
to
eat
specifically
academia.
Finally,
you
need
to
fetch
it
and
for
that
to
be
cycled,
that's
wrong
actually,
before
we
move
on
using
these
three
logos
at
the
bottom.
Basically,
everything
on
this
summing
so
on
your
left
side
of
the
screen
is
ideal.
The
areas
like
that's
like
data
structure
system,
we
use
everything
on
the
right
side.
A
You
just
look
a
tepee,
that's
the
networking
system
and
then
the
bottom.
That's
the
whole
perform
logo.
All
these
system,
these
multi
parts
and
glue
themselves
together
point
out
how
these
things
work,
presentation,
progresses.
Okay,
the
first
thing
we
do
is
we
chunk
the
edge,
so
they
start
with
a
continuous
final
and
a
very
small
pieces.
We
did
this
for
a
deduplication
to
allow
for
piecewise
transfer
and
Duloc
we're
seeking.
Oh.
A
And
also
each
chunk
is
occurs.
Okay,
first
of
all,
T
duplication.
You
can
import
a
file.
We
may
end
up
seeing
that
paly
two
pieces
are
the
same
piece,
its
case
that
you
want
to
be
super
same
with
there,
because
we
took
this
like
this.
We
can
actually
just
not
store
the
second
piece
unless
or
the
Emergencies
at
once.
A
Second
whole
piece
wise
transfer,
I
can
keep
on
fetching
pieces
and
then
immediately
notice,
but
that's
the
entire
thing
that
this
piece
is
back,
so
they
can
go,
goes
up
here
and
actually
find
the
new
copy
that
he's
the
correct
piece
if
I
just
have
to
like
fetch
the
entire
thing
then
affecting
everything
else.
Oh,
this
is
not
for
a
thing,
throw
it
away.
That's
another
entire
large
file,
your
side!
No,
that's
not
the
right
thing,
throw
it
away
this
case.
A
I
can
give
them
like
each
little
piece
and
it's
like
learn
early,
whether
or
not
the
times.
The
right
thing
finally
chunking
allows
is
to
seek
in
a
file.
So
it
means
instead
of
us
having
to
download
the
entire
file
use
a
teaspoon
want.
We
can
just
as
if,
like
hassle
these
two
don't
care
about
and
find
a
piece.
We
want
okay,
UNIX
effects.
So
now
we
have
this
file
and
it's
been
chomped
into
little
pieces,
but
that
doesn't
really
give
us
a
file
system.
A
A
A
A
Okay,
now
that
we've
create
the
file,
we
need
to
action,
video
directory.
We
do
this
by
this
mapping
file
names,
two
files,
again
music
actions,
verbal
links
so
appreciate.
For.
Finally,
we
need
to
actually
look
at
Steve
greatest
logical
structure
using
hashes
and
bobs
of
data
and
data
structures.
We
can
actually
encoded
somehow
transfer
Network
sort
on
disk
talk
about
it,
so
my
god
for
that
musical
ability.
A
I
know
these
come
about
me,
metaphor,
understand
a
encoding
marketing
data
structures
we
use
in
that
BFS,
but
we
also
have
a
can
use
I,
peeled
a
to
understand.
It
gets
interfering
because
it
also
murkland
data
structures,
basically
I,
believe
it's
a
verb,
typing
or
hadn't
been
a
metadata
to
perfectly
the
type
of
is
like
Haley.
This
is
a
gift
time.
This
is
an
this.
Is
the
nithy
ring
Doug
and
like,
as
you
use,
I
really
didn't
walk
these
data
structures.
You
remember,
though,
I'm
like
this
is
the
tears
are
for
me.
A
This
is
the
context
of
in
so
you
can
like
remember
how
to
and
find
the
next
piece
or
understand
the
different
pieces.
So
just
a
diamond
a
bit
more
to
what
level
he
is.
The
name
comes
from
in
Japan
greatly
data.
So
if
you're
familiar
with
massive
linked
data
is
actually
originally
a
case
and
vertically.
A
And
that
other
you
could
put
another
just
are
confusing
the
problem
with
this
is
that
URLs
have
an
authority
and
then
authority
in
this
case
a
comm
can
change
what
it
wants
to.
You
don't
want
that.
We
don't
want
to
trust
anyone
so
ideally
uses
fashions.
So,
instead
of
having
to
be
rel
usually
equals
an
action
hash
points
into
the
Roger,
it's
also
a
mutable.
A
Okay.
Now
we
finished
up
with
internal
data
structures
banana
chocolate.
How
do
we
actually
gain
things?
The
system?
So
we
now
have
all
these
like
objects
that
are
restored.
My
ability
I
may
need
to
be
able
to
talk
about
them
and
pass
the
round
the
network,
but
if
you
sign
called
cm
IDs
for
content,
identifiers,
loosing,
two
examples
of
see.
A
A
A
Basically,
it's
just
enhanced
with
a
bit
of
extra
minute,
and
this
is
how
many
every
single
piece
of
okay.
First
of
all,
why
do
we
use
dashes?
Oh
you
heard:
why
do
you
see
if
he's
in
half
is
like
they're,
a
verifiable
immutable
and
trustless
permanent
so
like
if
I
haven't
see
it
in
point?
Somebody
it'll
always
point
to
that
same
thing.
You
might
have
know
people
who
find
it.
A
I
can
tell
exactly
what
I
wanted
if
I
got
back
the
birthday.
So
that
means
like
this
is
a
picture
and
if
I'm,
a
pretty
good
picture,
weird
and
good
by
the
same
picture,
I
don't
get
division.
My
other
cat,
who's,
less
friendly,
more
friendly,
okay
person
coming
back
is
content
dressing,
person's
location,
aggressive,
okay,
so
content
identifiers
address
content
by
content,
not
by
where
it
is,
is
it
genders,
but
what
it
is
not
where
it
is.
This
is
important
for
ifs,
because
then
it
could
be
any
more
networking
fashion
for
men.
A
Here's
you
don't
to
say
trust
them
yeah
both
now
we're
gonna
do
what
exactly.
That
is
what
the
distinction
is.
Okay,
sure
dressing,
I
can
say:
I
can't
cause.
He
isn't
there
get.
Someone
happened
say
go
up
into
my
account
content
dressing.
This
is
my
god.
That's
really
difference.
We're
computer
system
describes
thing
you're.
Looking
for
okay,
she
doesn't
tell
us
what
we're
finding
okay.
A
So
what
was
the
problem
occasion?
Rest
well
like
I,
can
say,
go
here
if
I
might
have.
But
what
if
you
find
this
guy,
you
don't
know,
that's
not
the
right
cap,
because
it
will
define
the
cap
right
there.
You
found
the
cat.
You
give
me
the
cat.
You
gave
me
the
wrong
cap
important.
You
can't
know
that.
So
that's
what
we
use.
A
A
A
This
is
section
working
discuss
little
bit.
First
of
all,
we
have
two
types
of
schedules.
We
have
C
0,
C,
2,
D
1.
You
don't
have
to
get
too
much
into
this,
but
basically
CDP's
there
is
the
old
form
of
cid
so
that
when
they
actually
use
most
frequently
at
the
moment
see
you
baby,
one
is
new
form
of
CID.
It
has
even
formatted.
It
could
really
didn't.
Have
nothing
to
give
me
0.
Db
0
has
only
one
piece
of
in
it
and
that
is
C.
A
They
are
suppose
to
stick
with
that,
promote
they
actually
just
a
special
hash
ever
think
of
this
type
of
hash
them
use.
Then
it
wasn't
have
to
digest
and
something
about
the
most
like
to
enact
did
no,
it's
the
type
of
attachment
used
to
produce
an
heir
scientist,
see
adv.
One
is
a
multi
base.
Encoded
I
feel
before
mat.
Molding
are
stable,
ok
for
full
of
addition
just
covered
this
whole
dance.
It's
all
describing
maps.
A
Stop
whatever
they
want
to
in
the
future
and
I
think
you'll
know
which
one
I'm
using
because
I
concluded
in
the
hash
itself.
But
your
talk
was
like
a
multi
couldn't.
Did
you
explain
it
is
that
a
multi
good
at
using
non-metric
network
so
often
are
based
on
these
new
magic
numbers
did
like
are
used
to
indicate
various
things.
Various
file
types
like
you
ever
sorry,
you're,
trying
to
figure
out
what
type
of
file
something
is
on
your
desk
windows
uses
extensions,
but
actually
like
Mac,
OS
and
Linux.
A
These
single
magic
numbers
where
there
was
like
reefer
she
bites
the
file
and
see
it
like
the
bite
unit.
First
bites
match
someone
known
prefix
for
some
pop
to
the
bottom,
but
fortunately
there's
no
tipping
sorry.
There
are
tables
these,
but
they
aren't
like
decided
to
have
time
to
just
like
sort
of
random
earth.
A
A
A
A
And
Lord
is
there.
This
is
not
level
browsers
and
we
realize
that.
Actually
you
know
what
certain
contexts
will
need
to
use.
One
basically
put
in
the
context.
We
need
to
use
another
base
encoding,
but
we
need
to
actually
able
to
tell
which
basically
we're
using.
So
this
is
revolt
against
Canada
kind
of
like
multinationals
of
the
format's
or
all
the
moments.
We
use
the
prefix
to
tell
you
what
type
of
basically
music.
So
in
this
case,
if
you
see
a
premise
on
you'll
know,
it
is
encoded
using
face
32.
A
A
Okay,
actually,
this
is
the
final
one.
Finally,
I
Billy
I
say
so
remember
in
CID
who
wanted
how
I
said
that
it's
a
multi
based
encoded.
Now
we
use
the
boulder
is
prefix
and
then
some
basic
code
of
thing
to
both
my
ability,
format
and
multi
hash.
The
ability
for
map
tells
us
how
we
included
the
data
that
the
function
so
the
whole
thing
I
told
us
like
which
data
we're
talking
about
this
especially
content.
A
A
A
A
A
The
second
version
is
how
you
actually
describe
this
thing
normal
that
using
New
York
dollar,
but
in
case
you
use
it
kind
of
you
have
to
give
this
a
get
+
ssh,
because
you
can't
compose
multiple
verticals.
That
path
was
actually
composed
protocols.
So
this
is
why
he
is
not.
This
has
been
a
very
contentious
issues
if
I
bring
it
up,
but
we
use
them
because
they
want
to
go
up
like
a
bed
protocol
with
the
protocol
protocol
run
protocol
protocol
protocol.
A
Okay,
the
final
part
of
naming
is
I
minutes.
This
is
actually
our
naming
system.
Ie
an
S
stands
for
the
interplanetary
news.
It's
so
I
Venus
allows
you
to
map
the
public
key
towpath
and
then
way
this
works
is
basically
taking
your
the
packet
right
amount
to,
and
you
take
your
public
key
and
a
private
key.
And
then
you
use
your
your
private
key
to
sign
the
Matthew.
What
you
do,
then
these
publish
the
little
fella
hey.
This
is
like
this
is
the
kind
of
this
publicly
currently
wants
to.
A
Then,
if
you
want
to
update
it
so
I
guess
updating
you
just
signing
the
record
and
Lisa.
You
actually
put
additional
sequence
numbers
and
like
this
is
version
2.
You
know
you
can
say
this
is
3
per
support,
etc.
Finally,
this
initial
point
of
arbitrate
paths
so
I
can
use
my
pianist
point
that
I
made
us
I.
Think
if
you're
a
user
to
point
to
swarm
I
could
use
it
to
point
to
you
think
anytime
they
wanted.
So
it's
not
assisting
specific
as
Jennifer
was
cool.
A
A
B
B
A
A
A
It's
a
bit
of
a
problem
in
this
up:
you're,
pretty
big,
a
single
peer
can't
easily
hold
this
Brown
table,
maybe
at
the
moment
they
could
buy
in
the
future.
They
won't
be
able
to
do
that,
so
we
have
to
figure
out
like
how
do
we
do
this
Master
Brown,
cable
them,
where
we
have
to
store
to
do
that,
we're
using
all
those
distributed
hash
table
and
you
take
the
router
table
and
distribute
it
amongst
all
peers
and
efforts.
So,
instead
of
copying,
like
everyone
know,
who
has
one
body
or
my
handsome
no.
A
B
B
A
A
Okay,
so,
like
you
have
some
piece
of
content,
if
you
want
to
you
find
the
peer
there's
responsible,
remembering
who
asked
you
who
you
tell
them,
I
have
killed
them,
they've
tried
money,
kill
them
foo,
you
find,
if
you're
responsible
for
every
us,
computer
and
as
Cuba,
and
they
tell
you
some
or
usually
a
lot
of
people.
Ok,
now
we're
looking
into
torrent.
How
he'll
know
works
because
it's
a
bit
complicated
and
you
give
me
paper
but
I'm
gonna,
give
it
a
quick
overview
of
the
general
idea.
A
A
A
B
A
A
Minutes
it'll
be
how
to
chase
need
property.
Really.
Everyone
remembers
appears
of
next
to
them
and
then
peers
early
early
happy
for
the
cap
refer
they're.
Getting
have
to
go
there
again.
The
cool
thing
about
this.
This
is
the
cool
thing
about.
This
is
like
that
means
like
when
I'm
trying
to
find
content,
I
can
always
get
halfway.
Close
reach
times,
like
the
first
top
logo,
probably
cross,
never
defined
appears
like
a
closer
next
time.
Those
beers
will
tell
me
about
peers
that
are
can
have
my
closer.
Then
the
peers
I,
like
those
next.
C
A
A
A
A
A
A
A
system
you
don't
ask
for
something
and
then
get
a
response
back.
It
said
you
tell
someone
else
what
you're
looking
for
and
then
I
mentioned.
Then
they
give
it
back
to
you
so
quasi.
There's
like
easy.
Why
I
actually
remember
cause
he
still
wants
cuddles,
so
the
future
makes
you
more
cuddly
with
locally
happening.
Easy
may
finally
give
us
he
goes,
but
for
now
she
doesn't
have
to
haul
so
she's
a
bit
same
with
Ozzy
Ozzy,
making
eventually
decided
to
give
your
personal.
A
B
A
A
Below
them
grabs
think
is
the
next
protocol
for
fetching
data
so
bit
swap
like
it's
not
like
I
tell
you
this
at
them.
You
said
things
I
want
you
tell
me
some
things
you
want
was
prancing
I,
give
you
a
description
of
the
subset
of
some
marbles
there
gurgle
tree
that
I
want
and
you
give
them
that
to
give
back
to
all
ones.
So,
probably
that's
all
I'm
trying
to
like
walk
down
a
factory
tree
I
would
have
to
ask
you
for
this
piece.
You'd.
A
Give
me
this
beast,
then
it's
a
no
actually
I
want
the
last
block,
so
I
want
block
in
the
back
or
a
machine
whatever
you
did
D
so
I
would
ask
me,
for
this
means
back
to
me,
and
they
say:
oh
I
want
this
last
piece,
so
Tata
scale
is
being
affected.
Unfortunate
means
they
have
to
do
one
more
trip
for
this
is
one
round
trip
for
this
and
the
whole
merger
for
this,
and
it's
gonna
be
really
slow
with
Network.
A
A
Okay,
so
how
does
grass
think
we're
like
paralysing
fetching
mobile
gears?
Okay,
at
the
moment,
the
critical
asian?
Doesn't
it
just
like
you
tell
it
fetched
in
this
one
here
in
theory.
The
way
this
will
work
is
like
you
start
asking
one
gear
for
sorry,
some
up
here
for
something
like
it's
up
set
up,
dag
and
then
you
can
like
send
them
update
person,
actually
don't
care
about
the
subset,
and
then
you
go
and
send
that
subset
another
pair.
This
is
a
complicated.