Changes for page Definitions
Last modified by Zenna Elfen on 2026/01/04 21:45
From version 8.1
edited by Zenna Elfen
on 2026/01/04 21:45
on 2026/01/04 21:45
Change comment:
There is no comment for this version
To version 6.1
edited by Zenna Elfen
on 2025/11/27 12:13
on 2025/11/27 12:13
Change comment:
There is no comment for this version
Summary
-
Page properties (1 modified, 0 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -8,6 +8,18 @@ 8 8 |Revocation|//Ability to withdraw access (essential yet tricky, since there's no central admin)// 9 9 |Identity-agnostic control|//Often operations are authorized not by who you are but what capabilities you possess// 10 10 11 + 12 + 13 +== == 14 + 15 +== == 16 + 17 +== == 18 + 19 +== == 20 + 21 +== == 22 + 11 11 == Definitions for Security and Encryption == 12 12 13 13 (% border="1" dir="ltr" id="sec_def" style="margin-right:auto" summary="Definitions for Security and Encryption" %) ... ... @@ -14,7 +14,7 @@ 14 14 |=Security Function|=Purpose|=Examples 15 15 |Transport Encryption|//P2P channel confidentiality//|//TLS, Noise// 16 16 |[[Private Interest Overlap>>https://willowprotocol.org/specs/pio/index.html#private_interest_overlap]]|//allows peers to securely determine if they have capabilities in common without revealing what those capabilities are//|//Willow// 17 -|[[Prefix Pruning>>https://willowprotocol.org/specs/data-model/index.html#prefix_pruning]]| //Enables removal of data by replacing data with a new timestamped file that is empty, encouraging replication of the deletion. "you have a path hierarchy which lets you prune off a whole bunch of leaves by cutting at the root. Like if you replaced your Documents directory with a text file of the same name."//|//Willow//29 +|[[Prefix Pruning>>https://willowprotocol.org/specs/data-model/index.html#prefix_pruning]]|Enables removal of data by replacing data with a new timestamped file that is empty, encouraging replication of the deletion. "you have a path hierarchy which lets you prune off a whole bunch of leaves by cutting at the root. Like if you replaced your Documents directory with a text file of the same name."|//Willow// 18 18 |Message" Encryption|//End-to-end secrecy, async//|//MLS, Olm/Megolm, DR// 19 19 |Identity & Trust|//Who’s who, key bootstrapping//|//DIDs, TOFU, Web-of-trust// 20 20 |Integrity|//Detect tampering//|//AEAD, Merkle DAGs//