14 years of research and development is coming to fruition as we put together the final building blocks of what some said was impossible: Secure Access For Everyone.
Safe Fleming Network
The next major milestone for the Safe Network. This will be a standalone Network that will enable individuals to run Nodes - decentralised storage from home computers. The release of Fleming will be notable for many reasons, not least the fact that with data storage, the Network will now also contain Test Safe Network Tokens.
MaidSafe invented the technology that lets someone log into a decentralised network securely without requiring the involvement of a third party. The testnets we have released are the only place in the world today that you can see this in action.
Invented by MaidSafe, this is the process by which any file to be stored in the Network is first broken into chunks, hashed, and then encrypted. These chunks are then themselves encrypted using the hash of another chunk from the same file.
Ensures that the Network can scale by managing the responsibilities and locations of each node without requiring any human intervention. This also acts as a security measure to ensure that an attacker cannot choose their location or responsibilities.
Ensures that a message can be sent between nodes in different Disjoint Sections. Each message contains signatures of the members of the Disjoint Sections and is verified using these signatures.
Each node on the Safe Network is given an age by the Network itself. The node age increments every time that a node moves between Disjoint Sections, with only the most senior (Elders) entitled to vote.
Dig into the detail in the RFC, and join the discussion on the forum.
Secure Message Delivery
Ensures messages are sent and signed in such a way that lets nodes rely on the contents of each message despite having no previous relationship with the sender. This solves a problem faced by many existing blockchain-based projects and is essential when you have a Network that will autonomously move nodes around as required.
Reliable Message Delivery
Ensures that all sent messages will be successfully delivered to their destinations, even when some nodes responsible for the delivery are failing.
Software that lets computers communicate in an encrypted manner on the Safe Network. The software provides the infrastructure for messages to travel whilst the Routing layer of the Network sets the rules about which directions those messages can travel in.
Test Safe Network Tokens & Wallet
Safe Network Tokens are the incentive mechanism that encourages individuals to provide the computing resources that the Network requires: storage, broadband, and CPU resources.
Individuals who choose to supply the resources that the Network requires have the opportunity to be rewarded with Safe Network Tokens. This work ensures that the Network rewards those who provide it with valuable resources.
Nodes From Home
Decentralised data storage is a key element of the Safe Network. This enables nodes to participate regardless of the resources they offer.
Public and Private Data Types
Public data refers to content that is published (made available) for everyone such as websites, blogs, or research papers. For such public content, it becomes important to retain a history of changes. History must not be allowed to be tampered with and the public data must remain forever. Private data is data that is not desired to be made public such as personal data or organisations’ data stored on the network
Private ImmutableData Data Type
There are many times when a user will require to create Immutable Data to store private content. As long as this content is not published (made available for others) this will be deleteable by the data owner only.
Safe Maxwell Network
The release of Safe Maxwell builds on top of Fleming and enables the network to upgrade, improves security and sets the ground work for switching Test Safe Network Tokens to real Safe Network Tokens.
Spam includes nodes attempting to carry out activities that they shouldn’t or valid activities at a scale that is intended to choke the Network. The Network should be able to withstand a reasonable volume of such attacks.
The Network will have the ability to upgrade itself in order to allow features and improvements to disseminate throughout the Network. The upgrades must be done in a way such that they don’t cause harm to the Network.
This is an important stage in the evolution of the Network as it means that new software can then continue to be rolled out onto the existing Network without disrupting the existing functionality.
Upcoming Network Features
The following list represents network work that remains to be completed. The order should not be seen as fixed in any way as in certain cases, work will be carried out in parallel by different teams.
Creates an area within the hardware of a computer that is a secure, trusted environment that stands separate from the rest of the computer. It functions like a mini-computer inside existing computers that cannot be opened.
The Network allows controlled growth to ensure that the majority of decision-makers are healthy nodes that follow the rules of the Network. This growth should be sustainable in order to avoid unnecessary mergers between Sections.
In the event of a catastrophic outage, the Network should be able to rebuild itself because it maintains the integrity of essential data (such as chain history) which enables it to start functioning again on the basis of the last known state of the Network.
Ensures that data on the Safe Network is stored in such a way that the format can be understood by other Semantic Web projects, such as Solid.
Obfuscating stored data
Ensures that even the smallest piece of data that is stored in a Node cannot be read by the person controlling the computer on which it is stored.
Apps and User Experience
The latest release includes some of the beginnings of the Perpetual Web. Please note that it's only compatible with the Nodes Phase 1 release.
The Perpetual Web
The Safe Network is designed to ensure that public data is permanent and can never be deleted. Individuals and groups can choose to keep their data private, but once it’s been made public, it will remain permanently available. This milestone aims to showcase the incredible power of this facet of the Network, by building out the User Experience, and iterating on it right through to launch.
The Safe Browser functionality will be extended to incorporate new features that are unique to the Perpetual Web, such as the ability to roll-back through the version history of any Safe website or asset.
Enables individuals to access the Safe Network directly by using a browser on their mobile phone
A suite of tools which provides the necessary functionality to add data to the Safe Network, publish perpetual data, and manage Public Names. This will supersede the Web Hosting Manager.
A command line tool to manage data on the Safe Network. It will allow the user to store data on the network and manage accounts, identities, and permissions. This is the tool that the frontend apps and features—such as the Data Manager—will build upon.
Public Name System
A domain name system translates numerical IP addresses into a format that can be read by humans (eg. http//220.127.116.11 resolves to Google.com). The current web relies on a centralised organisation to maintain that record. The Safe Network requires this process to be outside the control of a single party in order to avoid censorship and repression.
If we want a world in which individuals can communicate freely whenever they choose, privacy is essential. This milestone aims to deliver just that.
One of the most sought after features of the Safe Network: secure, private, instant messaging.
Improves the user experience for individuals as they switch between the identities (or profiles) that they choose to represent themselves with on the Safe Network, without the need to create multiple accounts.
Enables Safe users to find and connect with other people across a range of applications in a consistent way.
Take Control of Your Data
The Safe Network turns the current data ownership model on its head. Personal information will no longer be stored on corporate servers. Self Authentication gives you complete control over your data. You can grant (and revoke) permission for apps to use your data at any time and prevent any unauthorised company or third party ever gaining access.
The extension of the Data Manager tool to allow fine-grained control by individuals over their private data.
Ensures that the Safe Network understands a way of describing the architecture of data that is understood by other projects, such as Solid
Enhances the functionality of Safe by adding SPARQL support to Safe Network Client and Safe Network Node. This ensures that the Network can understand a well-known semantic query language, and enables users to search.
Manage sharing and permissions of private, unpublised data and files, for collaboration between individuals and groups.
Create a system of standardised URL’s on the Safe Network that are based on the XOR address of the content being referenced. Ensures that individuals can access and locate data and files in a more user-friendly manner.
The New Digital Economy
The new digital economy is all about ensuring that you no longer pay for your digital life with data. Instead, you use a cryptocurrency that’s integral and distributed by the Safe Network. You earn value in return for providing resources to the Network.
Test Safe Network Token Wallet
Users will be able to use Test Safe Network Tokens in the Network, allowing an ecosystem to built around the Safe incentive mechanism. The ability to create multiple wallets, associate them with an identity, and also one-time-use wallets to enable anonymous transactions, will all be part of this.
Node User Interface
Users will see greatly-improved Node User Experience. Anyone providing storage to the Network can expect to see a number of usability improvements, making it easy to offer resources and start farming on everyday home computers and devices.