CIDs are immutable hard links, so if even one byte of data is altered, a new CID will be generated during the hashing process. This helps ensure content authenticity in a decentralized and trustless environment. #contentaddressing #decentralizedweb #web3
#contentaddressing #decentralizedweb #web3
Location-based addressing uses soft links (URLs) to point to where the file is located.
Content addressing, on the other hand, uses cryptographic hashing to generate a unique identifier (CID) from the data that describe itself. The CID acts as a hard link that points to a specific version of a file.
Learn more about how content addressing works and its benefits for distributed systems today on the blog: https://fission.codes/blog/content-addressing-what-it-is-and-how-it-works/ #contentaddressing #IPFS
Location addressing is a method for referencing data by it's location in a storage system.
Content addressing, on the other hand, references the data itself. It does this by generating a CID (content identifier) that is unique to that piece of content.
Content addressing provides key benefits like immutability, verification of data, and deduplication that location addressing can't. #ipfs #contentaddressing
#ContentAddressing is cool but I don't think we've really explored enough variations of what the unit of content addressing is. IPFS takes everything to be flat and with a singular representation - every thing has one global representation. one could imagine content addressing indicating a given thing and its context - eg. a thing as shared with this subset of people, a thing as it relates to this other thing, etc. this is necessary to make content addressed systems not be at least implicitly immutable/trade off hard with privacy.
coupled with a generalization of #MerkelDAGs along those lines, one would still be able to take advantage of the deduplicating effects of content addressing - say that I distribute an encrypted subsection of a graph, with the hash being of the encrypted binary blob and the ACL- or capability-like thing that describes who can decrypt it. when decrypted, that blob contains a Merkel DAG, which can then recursively contain other blobs+contexts that can be both a) shared and rehosted by all peers that can see them b) without everyone needing to know the contents of every recursive subgraph.
so, one could resolve as much of the recursively encrypted graph as one was supposed to, and since the edges of the graph don't need to strictly refer to an object with a unique hash, you don't have the same problems that lack of cycles presents with flexible data representation.
#contentaddressing #merkeldags #p2p