Successfully reported this slideshow.
Your SlideShare is downloading. ×

Maidsafe presentation

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Loading in …3
×

Check these out next

1 of 10 Ad

More Related Content

Slideshows for you (18)

Similar to Maidsafe presentation (20)

Advertisement

Recently uploaded (20)

Maidsafe presentation

  1. 1. Maidsafe Massive Array of Internet Discs Secure Access for Everyone Scalable decentralized applications No trust consensus without blockchains By Dirk Hoving – SAFE Amsterdam For presentation outline thanks to the Maidsafe team and the rest of the community. Special usage of framework made by @ioptio
  2. 2. Why Maidsafe? ● Internet access is highly dependent on centralized servers ● Traffic peaks make websites slow and susceptible to DDOS. ● Cost of maintaining and securing servers causes monopolisation. ● Current internet is susceptible to censorship. ● Many centralised servers get hacked ● Blockchain tech is hard to scale, there must be a better way to get consensus on ownership distribution
  3. 3. Maidsafe origins ● Founded by David Irvine in 2006. Inspired by ant colonies, more than 9 years in the making. ● More is different: complexity at large scale from simplicity at a small scale ● Ants have different roles, can switch roles, very adaptable ● Specialization, adaptability, communication and large numbers ● Crowdfunded in 2014, bitcoin caused an additional wave of interest
  4. 4. MAID ● Massive Array of Internet Discs ● Combining storage space, bandwith and CPU power ● Hardware combined into one global cyberbrain ● Anyone with device+internet connection can create vault ● MAID is what enables SAFE
  5. 5. From a presentation by @ioptio
  6. 6. Vault roles ● Storing data ● Data managers (managing data for other vaults) ● Verifying and validating other vaults ● Groups of 32 randomly chosen of which 28 need to reach consensus. ● Nodes not behaving properly get outranked
  7. 7. Data distributing ● Data split into 1MB chunks ● Each chunk stored at least 4 times ● All chunks are stored in a location depending on the hash of the chunk. Each chunk has a different location. ● Self encryption. Need all chunks to decrypt the whole. ● Parallel downloading of 1MB chunks makes data retrieval incredible fast.
  8. 8. SAFE ● Secure Access for Everyone ● Variety of encryption layers ● Privacy, security, freedom ● Self Authentication → no password information leaves your computer ● Store data, privately, shared or public ● Build and use applications that interact with this data
  9. 9. Safecoin and farming ● Integrated cryptocurrency. No distributed ledger in the form of a blockchain. ● Proof of resource will farm you safecoin ● Uploading data to the network costs safecoin. Safecoin is recycled and given back to the network. ● 10% of farming rewards go to app developers ● Micropayments, instant verification ● Reward content creators, cut out the middleman
  10. 10. The way forward ● Installers for linux coming this or next week ● Development bundle 1 being released this or next week (simple vaults, LAN only) ● Couple of sprints for Development bundle 2 (community run vaults and farming integration) ● Development bundle 3 (safecoin full implementation, POSIX API and messaging API)

×