Fission · @fission
597 followers · 385 posts · Server plnetwork.xyz

CIDs are immutable hard links, so if even one byte of data is altered, a new CID will be generated during the hashing process. This helps ensure content authenticity in a decentralized and trustless environment.

#contentaddressing #decentralizedweb #web3

Last updated 1 year ago

Fission · @fission
595 followers · 380 posts · Server plnetwork.xyz

Location-based addressing uses soft links (URLs) to point to where the file is located.

Content addressing, on the other hand, uses cryptographic hashing to generate a unique identifier (CID) from the data that describe itself. The CID acts as a hard link that points to a specific version of a file.

Learn more about how content addressing works and its benefits for distributed systems today on the blog: fission.codes/blog/content-add

#contentaddressing #IPFS

Last updated 1 year ago

Fission · @fission
571 followers · 334 posts · Server plnetwork.xyz

Location addressing is a method for referencing data by it's location in a storage system.

Content addressing, on the other hand, references the data itself. It does this by generating a CID (content identifier) that is unique to that piece of content.

Content addressing provides key benefits like immutability, verification of data, and deduplication that location addressing can't.

#IPFS #contentaddressing

Last updated 1 year ago

Jonny · @jonny
731 followers · 2355 posts · Server neuromatch.social

is cool but I don't think we've really explored enough variations of what the unit of content addressing is. IPFS takes everything to be flat and with a singular representation - every thing has one global representation. one could imagine content addressing indicating a given thing and its context - eg. a thing as shared with this subset of people, a thing as it relates to this other thing, etc. this is necessary to make content addressed systems not be at least implicitly immutable/trade off hard with privacy.

coupled with a generalization of along those lines, one would still be able to take advantage of the deduplicating effects of content addressing - say that I distribute an encrypted subsection of a graph, with the hash being of the encrypted binary blob and the ACL- or capability-like thing that describes who can decrypt it. when decrypted, that blob contains a Merkel DAG, which can then recursively contain other blobs+contexts that can be both a) shared and rehosted by all peers that can see them b) without everyone needing to know the contents of every recursive subgraph.

so, one could resolve as much of the recursively encrypted graph as one was supposed to, and since the edges of the graph don't need to strictly refer to an object with a unique hash, you don't have the same problems that lack of cycles presents with flexible data representation.

#contentaddressing #merkeldags #p2p

Last updated 1 year ago