This repository has been archived by the owner on Sep 15, 2020. It is now read-only.
Security Overview
Eric Harris-Braun edited this page Oct 9, 2017
·
2 revisions
NOTE: This page is out of date. TODO
This document addresses the fundamental areas of security:
Dominant Security Issues
Key Management and Key Evolution
- DPKI Holochain app
Built in Currencies
- DOS remediation
- Neighborhoods blacklisting bad actors
- When to use the blacklist tools
- Standard Process to declare yourself into a holochain
Members and Blacklisting
- Part of our stdlib will have blacklisting
- Bloomfilter not just on msgIDs, but on sourceIDs**
- If you're not a valid source, we drop your packets
- Enomomy of resources -
Transit Security
- Wire protocols
- MITM and replay attacks
- Gossip Protocols
Localhost Security
- Privilege Escalation
Reputation currency (add to glossary)
- DDOS
- MITM
- Network layer security
non-consensus system - RAFT is useless providing provenance for imprecise timed of a thing from a place DHT's nodes don't have the issues of consensus. They use a verification of agreements... not consensus... it's just validation, not time-bound.
Project Links: | Holochain Overview | Code Repository | White Paper | GoDocs API Reference |
---|
Holochain is part of Ceptr, and brought to you by the MetaCurrency Project