The Safe Network Primer
An introductory guide to the world's first fully autonomous data and communications network
Last update: November 2021
Major changes since last update:
Implementation of Digital Bearer Certificates
Implementation of Anti-Entropy
Implementation of conflict-free data types (CRDTs)
Move from pay on GET to pay on PUT when remunerating Nodes
New data CRDT types Register, Multimap
Design for n-of-k user authorization
A brief introduction
Technological progress is a perpetual process of automation and abstraction. Difficult and complex tasks are made simple by software and machines until they are completely taken for granted. Technology moves on, taking down new blockers in the path to progress as it goes. A good example of this is cloud computing, where once complex server administration tasks have been replaced, from the point of view of the consumer, by point-and-click.
The Safe (Secure Access For Everyone) Network takes this further, automating the entire network of interconnected machines, making it autonomous, secure, anonymous and capable of storing, protecting and delivering data without any human involvement at all.
The Safe Network is the vision of MaidSafe, a Scottish software company working in the field of decentralized computer networking. It is an autonomous peer-to-peer network created by linking together users' computers and smartphones that's designed to solve many of the current technical, managerial and societal problems exacerbated by centralized networks: a lack of privacy and data security, censorship and the massive consolidation of control by a few powerful actors.
(In case this sounds familiar, members of MaidSafe acted as advisers for HBO’s Silicon Valley TV series in which a startup tries to reinvent the Internet!)
The Network is ‘trustless’, with no central point of control and no single point of failure. With connectivity and security taken care of, the Network is simple from the point of view of developers, with the burden of having to worry about low-level storage, networking, backups and computing resources removed. For people using the Network to store and share data and messages the burden of ensuring the security of precious information would be drastically reduced.
Anyone with a connected device can use the Network anonymously to store data or peruse public information on it, and anyone (subject to a resource test) can join the Network anonymously as a provider.
The Safe Network is a platform on which new digital worlds can be constructed.
This guide outlines how the Safe Network is constructed to achieve these aims. While it is somewhat technical in places, it's intended very much as an overview, and even those with very little technical knowledge should be able to gain a good working understanding of the Safe Network. For those requiring more depth, there are plenty of pointers as to where they can find the relevant information.
Contents
-
Background and fundamentals
-
A fully autonomous data network
-
Nodes and Clients
-
The architecture of the Safe Network
-
Node Age
-
Encryption and authentication
-
Network-wide consensus not required
-
Safe Network Token and Digital Bearer Certificates
-
Safe Network Anti-Entropy
-
Data types
-
How Safe Network defends against common types of cyberattack
-
The promise of the Safe Network
https://primer.safenetwork.org/