-
Notifications
You must be signed in to change notification settings - Fork 166
Privacy / Encryption #138
Comments
I wonder if this should be on https://github.com/ipfs/notes instead? There is at least a label called Candidate Open Problem which at least seems to cover the topics on the issue description, and more. |
Yes, agreed. More or less covered in detail in ipfs/notes#270 and other issues in the aforementioned label. Closing for now and folks can re-open if they want to talk about encryption in the context of Rust IPFS. |
I'm tending towards encryption is out of scope for rust-ipfs and privacy issues are for libp2p to deal with. |
Also note that there is a theorem somewhere that there is a triangle (privacy, latency, bandwidth) and any solution needs to be within that triangle, so there are no magic solutions. I can dig it up if someone is interested. |
Definitely there are a lot of tradeoffs, I guess for me (as an observer who isn't contributing anything at all right now) the ideal world would be one where |
That's what I want too. The http api's are too opinionated and limiting. If you use libp2p you can choose which protocols you want to use and add your own. That's not possible with the http api as it includes the kitchen sink. |
In this issue a tangential discussion was started with regards to limiting access to data or protecting certain data. Some ideas were:
Agreement was reached to open a new issue to discuss this, so here it is!
The text was updated successfully, but these errors were encountered: