►
From YouTube: IPFS Weekly Call - 2019-05-27
Description
IPFS Newsletter: https://tinyletter.com/ipfsnewsletter
Peergos.org - is your data secure?
B
Hello,
everyone
and
welcome
to
the
ipfs
weekly
call.
This
call
where
we're
able
to
see
the
cool
stuff
that
people
are
doing
in
the
ipfs
community
and
today,
we'll
get
right
into
it.
I
am
Preston
from
Pierre.
Ecos
is
going
to
tell
us
about
his
project,
which
is
Yui,
p2p
storage,
so
we'll
learn
about
how
he's
using
IPS
and
we'll
learn
more
about
this
really
interesting
project,
so
we're
just
gonna
get
right
into
it,
and
I
am
Preston
or
dr.
Kristin.
If
you
can
start
sharing
that'd
be
great.
C
C
Is
your
data
secure?
Sadly,
for
most
people,
the
answer
is
no,
so
as
a
portraitist
and
I'm
going
to
introduce
you
to
ping
us
and
tell
you
how
we
do
what
we
do
and
why,
but
first,
let's
start
with
some
motivation.
So
what
do
we
have?
What
am
I
trying
to
do?
What
we're
trying
to
do
with
VMs
I
want
to
store
my
files
online,
but
without
Dropbox
being
able
to
read
them.
C
C
C
We
don't
know
exploded
that
to
anyone,
not
even
the
service
provider
by
that
I
mean
the
storage,
promote
and
we'll
treat
you
darkness,
so
no
need
to
put
in
a
phone
number
or
even
an
email
address.
And
finally,
if
you
want
anyone
to
actually
use
it,
it
has
to
be
convenient,
and
these
days
convenience
means
a
web
interface.
So
you
should
be
able
to
log
in
from
any
device
should
have
easy
file
syncing
across
devices.
You
should
be
able
to
publish
files
to
people
who
are
not
users
of
the
network
now
in
an
easy
way.
C
Essentially,
it
should
be
as
convenient
as
Dropbox
or
Facebook,
so
style
control.
The
overall
architecture
we
have
here
we
have
ipfs,
as
we
know,
is
that
is
a
Content
address.
Data
store
the
mapping
from
either
TNS
or
para.
Color
to
it
is
basically
mapping
for
public
key
to
a
hash.
We
use
I've
been
s
itself
yet
I
would
like
to,
and
the
only
other
thing
we
have
is
essentially
a
PKI
which
itself
stores
its
data,
a
might
be
FS
and
I
pianist
and
so
I
pay
gloss
server.
C
C
So
you
have
everything,
has
a
well-defined
path
and
your
file
system
has
a
tree
of
symmetric
keys,
now
use
tweet
NaCl
and
we
have
cryptographic
links
between
these
keys
in
a
structure
called
tree
which
I'll
talk
more
about
in
a
second,
and
so
you
end
up
with
a
location
plus
a
key
is
cryptographic
access,
token
or
a
capability,
and
that
allows
you
to
do
something
like
read
a
file
or
read
a
directory.
Alright,.
C
We
explicitly
done
use
conversion
encryption,
because
that
leads
the
contents
of
your
files,
and
this
is
a
diagram
of
the
cryptic
structure
we
use.
You
can
see.
We've
got
a
directory
on
the
left,
a
subdirectory
in
the
middle
and
a
file
on
the
right.
So
each
box
is
a
symmetric
key
and
each
arrow
is
is
a
link
from
one
key
to
another.
By
link
I
mean
it's
the
target
key
encrypted
with
a
source
key.
C
So
if
you
have
one
of
these
keys,
you
can
follow
links
from
that
key
around
the
diagram
and
drive
all
the
keys
and
so
yeah.
So
you
can
see
a
directory
has
two
keys:
a
base
key
and
a
parent
key.
The
base,
key
controls,
access
to
the
children
of
that
directory
and
the
parent
key
gives
you
access
to
two
things.
C
We
also
have
two
keys,
but
don't
files
don't
have
any
children
so
the
base
key
there
is
the
parent
key
and
the
other
key
is
the
data
key
which
is
used
to
encrypt
the
actual
data
and
similarly
the
metadata,
which
has
more
things
now.
It's
like
file,
size
and
mime
type
and
so
on,
they're
all
encrypted
with
the
parent
key.
C
Now
this
this
is
the
treat
for
controlling,
read
access,
so
if
I
want
to
just
share
a
file
with
someone,
as
well
as
the
location
which
we'll
talk
about
later,
you
share
this.
This
parent
key
for
the
file
the
base
key
similarly
fro
directory-
and
that
gives
you
access
to
the
entire
subtree
of
that
directory
with
just
the
one
to
one
key
and
location
and
the
corresponding
structure
to
this
or
write
access,
looks
a
lot
simpler.
C
C
For
each
thing,
and
that
key
has
a
link
to
or
encrypts
the
key
pair
for
that
directory
or
file,
and
so,
if
someone
has
the
base
right
key
for
a
thing
that
means
that
they
can
then
derive
to
keep
their
and
that
key
Perry's
is
it's
effectively.
The
IPS
keep
their,
which
is
used
to
sign
modifications
to
do
two
thing,
and
so
that
means
that
they
can
then
modify
it.
C
So
we've
taken
the
view.
The
right
access
implies
read
access
that
the
trees
are
actually
independent,
but
you
only
ever
share
my
access
with
read
access.
Unix
doesn't
technically
do
that,
but
the
exceptions
done.
Don't
really
apply
to
two
files.
They're
more
for
things
like
a
service,
that's
listening
and
you
can,
you
can
write,
become
read
it
kind
of
thing.
So
you
think
that
makes
sense.
C
C
We
do
a
few
things
within
each
file.
Make
chunk
of
like
rounding
it
up
so
that
you
can't
even
introduce
the
size
of
the
file
modulo
5
mm
so
come
over
exactly
I
think
we
rounded
up
two
modules
at
least
four
K,
maybe
more
and
then
anyway,
so
during
upload
these
these
encrypted
fragrancy,
but
those
know
it
be
first
and
then
we
have
an
encrypted
metadata.
The
critter
II
blob
with
local
links
to
these
fragment
hashes
and
each
of
those
tree
things
ends
up
in
another
data
structure
called
a
champ.
C
C
So
how
does
sharing
work
so
used
a
public
boxing
key
and
to
send
a
photo
request?
What
I
do
is
I
create
a
directory
for
that
friend
in
my
space
and
then
I
send
a
read
capability
to
this
directory
and
I
encrypt
it
to
the
friends
public
boxing
team
and
this
thing
gets
sent
and
stored
on
the
on
the
friends
storage
server
until
they
next
login
and
retrieve
it,
and
then
they
delete
now
after
they
processed
it.
C
So
what
this
means
so
that
that
sharing
mechanism-
currently
that's
co-chief,
fi
1:9,
so
I
mean
scared,
while
sad
files
currently
wonderful
to
a
large
quantum
computer.
If
someone
had
but
we'll
move
to
our
post
quantum
encryption
scheme
as
soon
as
a
clear
canada
arise,
which
is
progressing
rapidly
so
now
the
next
calorie
convenience.
C
So
what
does
the
login
mean
in
a
decentralized
system?
So
we've
you've
explained
already
that
pick
up
some
capability
based.
So
we
can't
stop
someone
from
getting
the
ciphertext
of
something.
What
we
can
do
is
control
access
to
keys,
and
so
what
we
do
is
you
take
your
password
and
salt
it
with
your
username
and
send
it
through
a
memory.
Hard
hashing
function
called
script
and
it's
tuned
to
take
a
second
and
that
the
output
of
that
is
three
things.
C
C
So
now
the
next
calorie
security
counter
login,
we
cracked,
so
brute
force,
is
practically
impossible
with
a
good
password.
So
it's
obviously
only
as
secure
as
your
password
and
we
we
put
some
work
into
trying
to
help
people
choose
good
passwords.
So
to
the
point
where
now
we
actually
have
a
button
which
will
generate
a
password
for
you
in
the
browser,
but
so
with
a
password
that
has
14
characters,
alphanumeric
characters
about
284
possibilities
or
10
or
25.
So
GPU
can
calculate
about
a
million
script
hashes
per
second
measured
by
litecoin
users.
C
So
that
means
that
one
GPU
cracking
a
single
users
login
would
take
about
10
to
the
19
seconds
or
300
billion
years,
or
if
you
had
300
million
GPUs,
it
would
still
take
a
thousand
years
and
those
300
million
GPUs
the
costs
just
to
buy
them
to
learn
the
electricity
to
run
them
would
be
300
billion
u.s.
dollars.
C
So
you
can
compare
that
to
various
budgets
of
very
consider
you,
your
own
threat
model,
but
at
the
other
end
of
the
spectrum,
if
you
drop
to
even
I,
think
something
like
an
eight
character
password
that
actually
only
costs
something
like
$10,000
to
crack
in
a
year,
so
password
length
matters
and
what
about
quantum
computer
based
attacks?
So
I've
already
mentioned
that
shared
files
currently
von
go
to
the
quantum
computer.
C
However,
it
files
that
aren't
shared
so
just
your
own
files,
they
are
actually
already
safe,
and
the
reason
for
this
is
to
get
from
nothing
to
reading
your
files.
There's
only
two
operations,
the
script
hashing
and
there's
symmetric
encryption,
and
neither
of
those
are
vulnerable
to
a
computer.
Now
you
get
like
a
factor
to
speed
up
and
not
an
exponential
speed-up,
so
that
actually
phone
and
then
the
classic
complaint
that
JavaScript
crypto
is
insecure.
C
C
They
can
just
download
the
JavaScript
and
log
in
and
do
it
for
people
who
are
who
are
more
paranoid
and
maybe
don't
trust
even
DNS,
then
they
can
download
the
source
themselves,
verify
it,
compile
it
run
it
locally
and
with
the
power
of
IP
first
they
don't
need
a
DNS
address
or
anything
like
and
so
yeah
this
we
can
cater
to
a
range
of
threat
mods.
Basically,
this
is
the
idea
it
has
to
build
security.
We
have
reproducible,
builds
already,
both
server
and
front-end.
We
only
have
eight
JavaScript
dependencies,
all
of
them
bended.
C
C
C
C
We
have
a
very
basic
text
viewer,
so
there's
a
recipe
for
lamb
stew.
We
can
also
play
videos.
This
is
a
more
impressive
demo,
so
this
is
the
collage
as
one.
So
if
we
look
at
the
sizes
since
I
want
to
happen,
20
make
so
if
we
play
that
Humphry
Meg
would
take
something
like
a
minute
or
so
to
download,
but
this
will
start
playing
as
soon
as
it's
downloaded
the
first
5
min.
So
you
remember:
the
5
make
chunking
thing
this
meet.
C
C
C
C
C
Not
sure
why
that's
there
anyway,
so
we
can
create
a
public
link
to
the
media
directory
I'll,
open
that
in
a
new
tab
you
can
see
there's
a
bunch
of
other
siblings
here
too
the
media
directory.
If
you
go
to
the
public
link,
you
can
see
the
URL
there.
We
can
see
the
things
that
we've
just
been
granted
access
to
and
if
we
go
down
a
directory,
then
all
the
owners
are
there
wicked.
But
if
you
go
back
up,
just
can't
see
any
siblings
and
that's
that's
not
just
you
I
think.
C
So
cool
yep,
the
rest
of
it's
fairly
self-explanatory
and
slides
right,
so
yeah,
the
other
big
news
is
on
Friday.
We
launched
our
alpha
for
bigges.
So
if
you
want,
you
can
sign
up,
there's
a
limited
number
of
spots
on
it,
but
yeah
alpha
dot,
pick
us
on
net.
Now,
if
you
want
to
read
some
more,
we
have
a
little
booklet
book,
stop
peeing
or
settle
or
just
check
out
our
source
and
get
on.
C
B
B
Do
you
mind
if
you,
let's
see
all
right
excellent?
First
of
all,
thank
you
very
much
for
your
presentation.
That's
wonderful!
Personally!
I,
really,
like
your
super,
clear
diagrams
of
how
you
encrypted
the
files
I
think
I
was
very
useful.
Thank
you
very
much
and
let
us
start
with
questions,
so
we
don't
have
so
much
time.
Davi.
A
B
C
We
take
the
view
which
is
kind
of
more
information
theoretic
view.
Once
someone
has
information,
you
can't
take
that
information
away
from
them
so
to
to
revoke
it,
so
the
keys
for
encryption,
keys
or
they're
all
symmetric
keys
or
there's
a
signing,
kids
against
as
well.
Basically,
you
just
rotate
the
keys.
If
you
want
to
revoke
access.
B
C
It's
a
sharing
is
internal,
and
so
once
you,
you
can
send
a
follower
request
to
someone
and
that
then
gives
them
a
read
capability
to
a
directory
in
your
space
forth,
for
that
particular
friend,
and
when
you
share
a
file
with
them.
All
that
does
is
attach
a
capability
to
that
file
into
that
directory,
which
they
already
have
read.
Access
to.
B
B
D
C
C
B
Okay,
so
those
will
be
the
questions
for
the
live
talk.
However,
this
is
what
we're
going
to
do
if
anyone
else
has
any
questions
when
we
put
up
the
video,
if
you
can
put
up
the
questions
in
the
comment
section,
then
that
will
be
another
like
alternative
way
for
you
to
get
your
answers
and
in
terms
of
next
week
or
format,
is
going
to
be
slightly
different
for
the
ipfs
weekly
call.
B
Oh
I,
see
Ali's
face
is
surprised
for
the
ipfs
weekly
call
we're
going
to
have
lightning
talks,
so
you
can
sign
up
five
minutes
during
a
call.
If
you
have
a
project
that
you
would
like
to
present
or
you
have
something
that
you're
working
on
that
you
want
to
get
out
there
and
give
some
feedback.
This
would
be
a
perfect
forum
for
that,
and
that
is
happening
next
week.
Next
Monday,
thank
you
everyone
and
is
that
a
hand
Duffy
yeah.
B
A
B
So
I
think
yeah
that's
been
merged
and
we
were
about
to
do
it
this
week,
but
we
are
going
to
do
it
next
weekend
spend
something
that's
been
in
the
works
for
about
a
month,
so
yeah
it's
there
and
it's
merged
cool.
Alright,
everyone
I
will
see
you
next
week
and
have
a
group
and
have
a
great
week.
Thank
you.
Everyone
and
thank
you.
I
am
think
thanks.