How the 7-year legal battle led to the creation of an unstoppable Ethereum archive (ETH) – Ethereum News Today – ETH / USD Price Today



[ad_1]

Ethereum

Swarm is a decentralized storage layer Ethereum (ETH) designed by Daniel Nagy after 7 years of legal struggle for hosting a file sharing node. A precursor to the peer-to-peer file sharing service, Nagy was testing a DC node.

After winning the fight, Nagy, who is known for launching the Hungarian extension of the Electronic Frontier Foundation, has decided to link up with the Ethereum Foundation. It was there that he was inspired to critically examine the technology resistant to censorship.

In particular, the developer's experience during the legal process helps to push his work on Swarm. Swarm is a highly anticipated Ethereum storage layer that focuses on cryptography and architecture that safeguard privacy.

The swarm makes decentralized storage more robust than ever before

Swarm allows Nagy to establish how to create decentralized storage that is robust enough to avoid any sort of legal repercussions in what it calls "an arms race" between regulators and developers. Swarm is designed to provide a basis for Blockchain to release many of its historical data and ensure that file storage is handled more efficiently.

With a greater emphasis on "efficiency, confidentiality, speed and security", a decentralized storage level is designed with the goal of making the cost of an inefficient attack so that the legal system is pushed to update itself as a response.

Unstoppable storage

Swarm aims to provide a basic infrastructure for a fully decentralized Internet. Divides data between computers of multiple network participants. To protect the level from censorship (something that Nagy defines as weeding out data from circulation) completing decentralization and privacy are essential. Although it is possible to store data transparently using Swarm, much of Nagy's work focuses on making sure sensitive information remains private, even if it is stored on another person's computer.

To achieve this, Swarm uses "counter mode" encryption. For example, in the event of a dispute, the protocol in counter mode shares a small fragment of encrypted information that the property can be verified without having to reveal other information. So, in order to access any information stored remotely, Swarm uses public and private key pairs. This is why participants will host encrypted blocks of data on their laptops, although in most jurisdictions they can do so with a plausible level of deniability. This means that because Swarm nodes do not have the keys to open data, they will not be a problem of being at risk of legal problems.

According to Nagy, this is important because an attack resistant storage is essential for healthy societies.

Future guidelines

The storage protocol is now in public alpha. This means that while it is still under development, anyone can open a Swarm node. In addition, the Swarm protocol will provide incentives in Ether tokens for all participants in the network. Although this aspect is still in the tuning phase.

Swarm encryption has been configured to be smart contract friendly to ensure that dApp developers seamlessly integrate the technology. This is because while it is primarily intended to store data from smart contracts and other blockchain information in a decentralized manner, there are more cases of use for Swarm at the horizon.

[ad_2]
Source link