Know about the invitation, and involvement with the group remainsįully deniable up until the point of accepting and interacting with Only the recipient and current group members will The invitationĮnvelope undergoes the same security considerations as everything else Receive and accept or reject invitations to a group. Members, where each member is simply a Sylo identity coupled with a Groups are effectively a collection of participating That gives rise to a number of other features such as group chat and Groups are a simple yet powerful construct In practice, however, contact relationships are often Contact relationships are, technically speaking, always Sylo network a user may choose to connect and stay up-to-date Protocol by being blessed with end to end encryption and forward The same level protection as any other feature built-into Sylo Store of application-defined user information that is optionally madeĪvailable to all Sylo peers or a select subset thereof. Your profile serves as a simple key/value State changing operations areĪlways queued for eventual delivery and propagation. Work entirely offline when network connectivity cannot be established No networks are available at the time the state transition is State changing operationsĪre scheduled for eventual delivery if network conditions are poor or Not assume a speedy network connection - or any network connection atĪll for that matter - in order to operate. In the spirit of being generally fault-tolerant, Sylo Protocol does Hence, Sylo ProtocolĪims to provide a feature set that is capable of matching userĮxpectations, while simultaneously solving for the aforementioned Possible if the experience is on-par or better than what is currentlyĪvailable and adopted by the target audience. Wide adoption of any new system - decentralized or not - is only Sylo Protocol thus considers fault-tolerance and recovery to be a first-classįeature that is deeply ingrained in all technical decisions the Sylo Protocol Responsibility of a dedicated operations team, but that of the very In fact, shifting business logic from central servers ontoĬlients themselves only pronounces the need for robust and responsibleįault management, where recovering from disaster is not the Operations fall onto the clients themselves, we look at performance asĪ first-class feature, not an after-thought.īy the very nature of how software operates and integrates, failure is In order to be adapted, decentralized solutions need to provide anĮxperience that is on-par or even better than traditionalĬommunication platforms. Gets compromised by responsibly securing all communications using Profiles in the unlikely event that a single message or session key Protocol also goes to great length to protect communications and Aside from removing the intermediaries, however, Sylo State and state transitions are propagated autonomously through the Since everything happens in a peer to peer setting, Sylo Protocol provides a high level of security andĬonfidentiality. Next section, this gives rise to a number of desirable security- andĬonfidentiality- impacting properties. All operationsĪre carried out in a peer to peer setting. Sylo Protocol does not rely on the operation of any centralizedĪrchitecture in order to function and function well. Sylo Protocol is a toolkit for building decentralised messagingĪn example use case is the Sylo Smart Wallet. This version of the Sylo Protocol is deprecated, however, the new version will be available soon.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |