Changes for page Definitions

Last modified by Zenna Elfen on 2025/11/27 12:13

From version 5.1
edited by Zenna Elfen
on 2025/11/27 12:02
Change comment: There is no comment for this version
To version 7.1
edited by Zenna Elfen
on 2025/11/27 12:13
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -8,25 +8,14 @@
8 8  |Revocation|//Ability to withdraw access (essential yet tricky, since there's no central admin)//
9 9  |Identity-agnostic control|//Often operations are authorized not by who you are but what capabilities you possess//
10 10  
11 -
12 -
13 -== ==
14 -
15 -== ==
16 -
17 -== ==
18 -
19 -== ==
20 -
21 -== ==
22 -
23 23  == Definitions for Security and Encryption ==
24 24  
25 25  (% border="1" dir="ltr" id="sec_def" style="margin-right:auto" summary="Definitions for Security and Encryption" %)
26 26  |=Security Function|=Purpose|=Examples
27 27  |Transport Encryption|//P2P channel confidentiality//|//TLS, Noise//
28 -|Private Interest Overlap|//allows peers to securely determine if they have capabilities in common without revealing what those capabilities are//|//Willow//
29 -|Message Encryption|//End-to-end secrecy, async//|//MLS, Olm/Megolm, DR//
16 +|[[Private Interest Overlap>>https://willowprotocol.org/specs/pio/index.html#private_interest_overlap]]|//allows peers to securely determine if they have capabilities in common without revealing what those capabilities are//|//Willow//
17 +|[[Prefix Pruning>>https://willowprotocol.org/specs/data-model/index.html#prefix_pruning]]|Enables removal of data by replacing data with a new timestamped file that is empty, encouraging replication of the deletion.  "you have a path hierarchy which lets you prune off a whole bunch of leaves by cutting at the root. Like if you replaced your Documents directory with a text file of the same name."|//Willow//
18 +|Message" Encryption|//End-to-end secrecy, async//|//MLS, Olm/Megolm, DR//
30 30  |Identity & Trust|//Who’s who, key bootstrapping//|//DIDs, TOFU, Web-of-trust//
31 31  |Integrity|//Detect tampering//|//AEAD, Merkle DAGs//
32 32  |Key Lifecycle|//Rotation, revocation, recovery//|//X3DH, key transparency//