Changes for page Definitions

Last modified by Zenna Elfen on 2026/02/16 14:43

From version 10.1
edited by Zenna Elfen
on 2026/02/16 14:35
Change comment: There is no comment for this version
To version 5.1
edited by Zenna Elfen
on 2025/11/27 12:02
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -6,29 +6,27 @@
6 6  |Delegation|//Allow a peer to grant some portion of its authority to another peer (e.g., "you can write to this dataset for 1 day")//
7 7  |Capabilities|//Tokens/objects that embody permissions and can be passed around securely//
8 8  |Revocation|//Ability to withdraw access (essential yet tricky, since there's no central admin)//
9 -|(((
10 -Identity-agnostic control
11 -)))|//Often operations are authorized not by who you are but what capabilities you possess//
12 -|Custom Protocols |Internal term used by Iroh-crew to refer to protocols which are built by joining multiple different components together.
9 +|Identity-agnostic control|//Often operations are authorized not by who you are but what capabilities you possess//
13 13  
14 -== ==
15 15  
16 -== Definitions for Architecture ==
17 17  
13 +== ==
18 18  
15 +== ==
19 19  
20 20  == ==
21 21  
22 22  == ==
23 23  
21 +== ==
22 +
24 24  == Definitions for Security and Encryption ==
25 25  
26 26  (% border="1" dir="ltr" id="sec_def" style="margin-right:auto" summary="Definitions for Security and Encryption" %)
27 27  |=Security Function|=Purpose|=Examples
28 28  |Transport Encryption|//P2P channel confidentiality//|//TLS, Noise//
29 -|[[Private Interest Overlap>>https://willowprotocol.org/specs/pio/index.html#private_interest_overlap]]|//allows peers to securely determine if they have capabilities in common without revealing what those capabilities are//|//Willow//
30 -|[[Prefix Pruning>>https://willowprotocol.org/specs/data-model/index.html#prefix_pruning]]|//Enables removal of data by replacing data with a new timestamped file that is empty, encouraging replication of the deletion.  "you have a path hierarchy which lets you prune off a whole bunch of leaves by cutting at the root. Like if you replaced your Documents directory with a text file of the same name."//|//Willow//
31 -|Message" Encryption|//End-to-end secrecy, async//|//MLS, Olm/Megolm, DR//
28 +|Private Interest Overlap|//allows peers to securely determine if they have capabilities in common without revealing what those capabilities are//|//Willow//
29 +|Message Encryption|//End-to-end secrecy, async//|//MLS, Olm/Megolm, DR//
32 32  |Identity & Trust|//Who’s who, key bootstrapping//|//DIDs, TOFU, Web-of-trust//
33 33  |Integrity|//Detect tampering//|//AEAD, Merkle DAGs//
34 34  |Key Lifecycle|//Rotation, revocation, recovery//|//X3DH, key transparency//