Federated infrastructure but user sovereignty: a “third way” between federated and P2P networks.

But we don’t need to go the whole P2P hog to get robust user sovereignty. Cryptography lets us separate who stores and routes data from who truly owns it. We can combine the easier infrastructure design of a federated protocol with the full decentralized security of a peer-to-peer protocol.

  • 667@kbin.social
    link
    fedilink
    arrow-up
    2
    ·
    1 year ago

    You got me a little closer to understanding that and I appreciate the effort you put in.

    Conceptually I have just that last little bit to understand about how would a user control all that you mentioned, as at some point that “user stuff” needs to be “stored” or “handled” at some point and I can’t yet understand where that happens.

    I get federation (after a couple of days of deliberation and study, but confederation just escapes me.

    • fruitywelsh@lemmy.ml
      link
      fedilink
      arrow-up
      3
      ·
      1 year ago

      If it makes you feel better I think the question of “where that happens” isn’t a a solved one really! Some examples of answers though are on the blockchain (essentially paying to be stored as part of the consensus mechanism’s data), IPFS (either volunteer or personally hosted off of it, or through a paid service to ensure it’s hosted somewhere), or stored locally by the user either manually, as part of a hardware token, or in browser cache.