all 12 comments

[–]JasonCarswellDAT Mod[S] 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

" Thanks to Ernest Hancock of FreedomsPhoenix.com, The Corbett Report is now on IPFS. Today James joins Ernest to talk about the problem of online censorship and the IPFS technology that is enabling a solution. (Don't worry, more information will be forthcoming once we get all the wrinkles ironed out.) "

Show notes, links, comments, platforms, formats: https://www.corbettreport.com/interview-1435-declare-your-independence-with-ipfs/

[–]cyber_burn 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (10 children)

ipfs sounds really interesting. haven't read much about it - what prevents a malicious node from attacking users?

like someone's node saying they have the website you're looking for, but they've added additional malicious code.

edit: oh cool i found this. they use immutable hashes for content. https://medium.com/@yaniv_g/hosting-websites-on-ipfs-with-ipns-b94659c42b52

though according to this person's explanation, you might have to check the hash yourself manually? doesn't seem like that would be hard to automate. couldn't you kick a node off the network if they have a different hash or just not connect users to that node if the hash doesn't match the content hash of what they're trying to access.

[–]JasonCarswellDAT Mod[S] 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (8 children)

Better than the censored Wikipedia article: https://infogalactic.com/info/InterPlanetary_File_System

[–]cyber_burn 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (7 children)

ah so it uses blockchain. thanks for the better link. guess the guy in the article i posted misunderstood.

also why is the wikipedia article so lacking?

[–]JasonCarswellDAT Mod[S] 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (5 children)

Sort of. I think.

IPFS is developed by Protocol Labs and they are developing 5 distinctly different projects intended to work with each other.

Filecoin is one of those other projects, and I believe they use blockchain.

I believe block storage is slightly different: https://infogalactic.com/info/Block_(data_storage)

[–]cyber_burn 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (4 children)

yea i think i misunderstood. read about block storage and the immutable hashes and the way they described how nodes don't need to trust one another, and it sounded like a ledger to me. but i don't think that's quite right.

[–]JasonCarswellDAT Mod[S] 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (3 children)

Immutable hashes is the most important part. It's a strength and a weakness. Some things are meant to be mutable, changeable, updated, improved, etc and IPFS didn't have an easy fix for this, but they were working on it. It's been a while so maybe they've got something figured out now.

Ultimately it makes for a great vault.

[–]cyber_burn 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (2 children)

true. seems ideal for static file hosting, but i can see how that would be a problem for sites under rapid development, or even standard bugfixes and new features. going to start reading more about this - i'd really like to see decentralization become a standard.

[–]JasonCarswellDAT Mod[S] 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (1 child)

Check out Holochain too (a terrible name for several reasons) as it sounds very similar.

[–]cyber_burn 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

will do. thanks.

[–]Arundel 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

IPFS does not use blockchain. It has neither blocks nor chains.

[–]Arundel 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

ipfs sounds really interesting. haven't read much about it - what prevents a malicious node from attacking users?

like someone's node saying they have the website you're looking for, but they've added additional malicious code.

Content-addressing is what makes this impossible.

The attack you describe is possible with HTTP, but impossible with IPFS.

HTTP retrieves files based on where they are. Switch the files at that location, and the user downloads malicious files instead.

IPFS retrieves files based on what they are. So you look for a file hash, and it retrieves the exact file you ask for, regardless of where it is.