@dirvine was just posting some more info on the storage of Chunks and the Vaults.
About the security of Chunks in the Vaults:
There are a couple of things we have done/can do here. Keeping in mind data is not persistent and will take a lot of effort to recognise already, but going further.
A vault creates an AES random key in memory and stores all data encrypted (again).
A vault uses a double encryption method, so stores with an AES key derived from real name. Then when a chunk is requested, we xor request against all known chunks we have to see if we have it (slower). This was in c++ code, but arguably can still be detected, although much harder.
Is simple and perhaps initially we should do this (a hour would code this in place), but we would have to keep in mind republishing of data between logins would be then not possible at all. So this affects network restarting on a global outage etc. (2. has same side effect)
So it’s under consideration, but as ever there are some side effects of such policies. Nothing wrong with keeping prodding though.
I have some more questions about the Chunks in the network.
-
I’ve seen some work has been done on compression. Will compression be enabled on the network before it goes live? Is it fast? like, how many MB’s can be un-compressed per second? My winrar takes some time to do stuff like that. Does this slows the network down a bit, or does the compression actually speeds it up,even while you need time to de-compress?
-
When someone alters the code of a client, will it be possible to not use self-encryption, and just put plain files (like a 1MB .jpeg) into the network? Your close nodes wouldn’t have a clue, do they? And would it be possible in theory to find that .jpeg back in someone’s Vault?
-
When a Chunk is PUT to the network, it actually goes to the datamanagers that are closest to the address of the hash of the Chunk. But before it’s actually stored, what do the datamanagers to the file? Do they alter it with another layer?
-
What about dispersion, is that technology still being used when someone PUT’s or GET’s data from the network?
-
And when I PUT a 4MB file to the network (4 Chunks), my 31 XOR-friends confirm I can PUT. After they do, to whom do I actually send the Chunks? Just the 4 nodes who are the closest to the hash of my Chunks? Or all the 31 nodes? Or random or dispersal etc?