Changes for page Definitions
Last modified by Zenna Elfen on 2026/02/10 22:42
From version 1.1
edited by Zenna Elfen
on 2025/11/23 23:14
on 2025/11/23 23:14
Change comment:
There is no comment for this version
To version 9.1
edited by Zenna Elfen
on 2026/02/10 22:42
on 2026/02/10 22:42
Change comment:
There is no comment for this version
Summary
-
Page properties (2 modified, 0 added, 0 removed)
Details
- Page properties
-
- Parent
-
... ... @@ -1,1 +1,1 @@ 1 -P4P. Projects.WebHome1 +P4P.WebHome - Content
-
... ... @@ -1,21 +1,24 @@ 1 1 == Definitions for Authentication and Access == 2 2 3 -(% dir="ltr" id="auth_def" style="margin-right:auto" summary="Definitions for Authentication and Access" %) 3 +(% border="1" dir="ltr" id="auth_def" style="margin-right:auto" summary="Definitions for Authentication and Access" %) 4 4 |=Function|=What it means in P2P context 5 -|**Permissions**|Define what actions a peer is allowed to perform (read, write, broadcast, modify state, etc.) 6 -|**Delegation**|Allow a peer to grant some portion of its authority to another peer (e.g., "you can write to this dataset for 1 day") 7 -|**Capabilities**|Tokens/objects that //embody// permissions and can be passed around securely 8 -|**Revocation**|Ability to withdraw access (essential yet tricky, since there's no central admin) 9 -|**Identity-agnostic control**|Often operations are authorized not by //who// you are but //what capabilities you possess// 5 +|Permissions|//Define what actions a peer is allowed to perform (read, write, broadcast, modify state, etc.)// 6 +|Delegation|//Allow a peer to grant some portion of its authority to another peer (e.g., "you can write to this dataset for 1 day")// 7 +|Capabilities|//Tokens/objects that embody permissions and can be passed around securely// 8 +|Revocation|//Ability to withdraw access (essential yet tricky, since there's no central admin)// 9 +|((( 10 +Identity-agnostic control 11 +)))|//Often operations are authorized not by who you are but what capabilities you possess// 12 +|Custom Protocols |Internal term used by Iroh-crew to refer to protocols which are built by joining multiple different components together. 10 10 11 - 12 - 13 13 == Definitions for Security and Encryption == 14 14 15 -(% dir="ltr" id="sec_def" style="margin-right:auto" summary="Definitions for Security and Encryption" %) 16 +(% border="1" dir="ltr" id="sec_def" style="margin-right:auto" summary="Definitions for Security and Encryption" %) 16 16 |=Security Function|=Purpose|=Examples 17 17 |Transport Encryption|//P2P channel confidentiality//|//TLS, Noise// 18 -|Message Encryption|//End-to-end secrecy, async//|//MLS, Olm/Megolm, DR// 19 +|[[Private Interest Overlap>>https://willowprotocol.org/specs/pio/index.html#private_interest_overlap]]|//allows peers to securely determine if they have capabilities in common without revealing what those capabilities are//|//Willow// 20 +|[[Prefix Pruning>>https://willowprotocol.org/specs/data-model/index.html#prefix_pruning]]|//Enables removal of data by replacing data with a new timestamped file that is empty, encouraging replication of the deletion. "you have a path hierarchy which lets you prune off a whole bunch of leaves by cutting at the root. Like if you replaced your Documents directory with a text file of the same name."//|//Willow// 21 +|Message" Encryption|//End-to-end secrecy, async//|//MLS, Olm/Megolm, DR// 19 19 |Identity & Trust|//Who’s who, key bootstrapping//|//DIDs, TOFU, Web-of-trust// 20 20 |Integrity|//Detect tampering//|//AEAD, Merkle DAGs// 21 21 |Key Lifecycle|//Rotation, revocation, recovery//|//X3DH, key transparency//