From: Zooko O'Whielacronx Date: Wed, 27 May 2009 15:09:16 +0000 (-0700) Subject: docs: edit about.html and include network-and-reliance-topology.png (loaded from... X-Git-Tag: trac-3900~12 X-Git-Url: https://git.rkrishnan.org/simplejson/frontends/about.html?a=commitdiff_plain;h=078c755ee86d761c97a46d5b06f7b2fb182b4a07;p=tahoe-lafs%2Ftahoe-lafs.git docs: edit about.html and include network-and-reliance-topology.png (loaded from http://allmydata.org ) --- diff --git a/docs/about.html b/docs/about.html index e95eae61..59bd00af 100644 --- a/docs/about.html +++ b/docs/about.html @@ -11,14 +11,13 @@

Welcome to Tahoe

Welcome to allmydata.org Tahoe, the Least-Authority Filesystem. This is a secure, decentralized, fault-tolerant filesystem. All of the source code is available under a choice of two Free Software, Open Source licences.

This filesystem is encrypted and spread over multiple peers in such a way that it continues to function even when some of the peers are unavailable, malfunctioning, or malicious.

-

See the web site for information, news, and discussion:

-

http://allmydata.org

-

Overview

-

A "storage grid" is made up of a number of storage servers. A storage server has local attached storage (typically one or more hard disks). A "gateway" uses the storage servers and provides to its clients a filesystem over a standard protocol such as HTTP(S), FUSE, SMB, or (S)FTP.

+ + +

A "storage grid" is made up of a number of storage servers. A storage server has local attached storage (typically one or more hard disks). A "gateway" uses the storage servers and provides a filesystem over a standard protocol such as HTTP(S), FUSE, SMB, or (S)FTP.

Users do not rely on storage servers to provide confidentiality nor integrity for their data -- instead all of the data is encrypted and integrity-checked by the gateway, so that the servers can neither read nor alter the contents of the files.

-

Users do rely on storage servers for availability. The ciphertext is erasure-coded and distributed across N storage servers (the default value for N is 10) so that it can be recovered from any K of these servers (the default value of K is 3). Therefore only the simultaneous failure of N-K+1 (with the defaults, 8) servers can make the data unavailable. Users rely on the gateway for the confidentiality and integrity of the data, and on any 3 of the 10 servers for the availability of the data.

-

In the typical deployment mode each user runs her own gateway on her own machine. This way she relies on only her own machine for the confidentiality and integrity of the data, and she can take advantage of filesystem integration using FUSE or SMB.

+

Users rely on storage servers for availability. The ciphertext is erasure-coded and distributed across N storage servers (the default value for N is 10) so that it can be recovered from any K of these servers (the default value of K is 3). Therefore only the simultaneous failure of N-K+1 (with the defaults, 8) servers can make the data unavailable.

+

In the typical deployment mode each user runs her own gateway on her own machine. This way she relies on her own machine for the confidentiality and integrity of the data.

An alternate deployment mode is that the gateway runs on a remote machine and the user connects to it over HTTPS or SFTP. This means that the operator of the gateway can view and modify the user's data (the user relies on the gateway for confidentiality and integrity), but the user can access the filesystem with a client that doesn't have the gateway software installed, such as an Internet kiosk or cell phone.

Access control