SlideShare a Scribd company logo
The SAFE Network
by Maidsafe
Massive Array of Internet Discs
Secure Access for Everyone
Dirk Hoving – Project SAFE Amsterdam
Special thanks to the Maidsafe team (especially @ioptio's framework) and the rest of
the community.
Why Maidsafe?
● Internet access is highly dependent on centralized servers
● Traffic peaks make websites slow and susceptible to DDOS.
● Cost of maintaining and securing servers causes monopolisation.
● Current internet is susceptible to censorship.
● Many centralised servers get hacked
● Blockchain tech is hard to scale, there must be a better way to
get consensus on ownership distribution
SAFE Network origins
● Founded by David Irvine in 2006. Inspired
by ant colonies, more than 9 years in the
making.
●
More is different: complexity at large scale
from simplicity at a small scale
●
Ants have different roles, can switch
roles, very adaptable
●
Specialization, adaptability,
communication and large numbers
●
Crowdfunded in 2014, bitcoin caused an
additional wave of interest
MAID
● Massive Array of Internet Discs
● Combining storage space, bandwith and CPU
power
● Hardware combined into one global cyberbrain
● Anyone with device+internet connection can
create vault
● MAID is what enables SAFE
Image by Paige Peterson
Vault roles
● Storing data
● Data managers (managing data for other
vaults)
● Verifying and validating other vaults
● Groups of 32 randomly chosen of which 28
need to reach consensus.
● Nodes not behaving properly get outranked
Data distributing
● Data split into 1MB chunks
● Each chunk stored at least 4 times
● All chunks are stored in a location depending on the
hash of the chunk. Each chunk has a different
location.
● Self encryption. Need all chunks to decrypt the
whole.
● Parallel downloading of 1MB chunks makes data
retrieval incredibly fast.
SAFE
● Secure Access for Everyone
● Variety of encryption layers
● Privacy, security, freedom
● Self Authentication → no password information
leaves your computer
● Store data, privately, shared or public
● Build and use applications that interact with this
data
Safecoin and farming
● Integrated cryptocurrency. No distributed ledger in the
form of a blockchain.
● Proof of resource will farm you safecoin
● Uploading data to the network costs safecoin. Safecoin
is recycled and given back to the network.
● 10% of farming rewards go to app developers
● Micropayments, instant verification
● Reward content creators, cut out the middleman
The way forward
● Installers for linux coming this or next week. Other
operating systems following shortly.
● Development bundle 1 being released this or next
week (simple vaults, LAN only)
● Couple of sprints for development bundle 2
(community run vaults and farming integration)
● Development bundle 3 (safecoin full
implementation, POSIX API and messaging API)
Final notes
● Maidsafe website: http://www.maidsafe.net
● Maidsafe forum: http://www.maidsafe.org
● SAFE Amsterdam meetups:
http://www.meetup.com/projectsafe-amsterdam/
● Questions?

More Related Content

ODP
MAIDSAFE Installer DEMO Project SAFE London
PPTX
Mozilla introduction 2020/05/05
PDF
Cloud Native Nordics - Real world Istio
PDF
Presented AITC Blockchain Framework @ NPC 17
PDF
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
PDF
FIWARE Global Summit - Building Real-time Dashboards to Monitor Context
PPTX
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
PDF
Decentralized Server-less Applications with Blockstack at AllThingsOpen
MAIDSAFE Installer DEMO Project SAFE London
Mozilla introduction 2020/05/05
Cloud Native Nordics - Real world Istio
Presented AITC Blockchain Framework @ NPC 17
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
FIWARE Global Summit - Building Real-time Dashboards to Monitor Context
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Decentralized Server-less Applications with Blockstack at AllThingsOpen

What's hot (17)

PPTX
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
PPTX
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
PPTX
Network security
PPTX
Infosec Europe 2017 Highlights | Lastline, Inc.
PDF
Cybersecurity and its oppoutinities
PDF
Monoliths, Myths, and Microservices
PDF
Firepower ngfw internet
PDF
The End of the Fortress: The new Approach to Cybersecurity
PDF
Web hacking using Cyber range
PPTX
Blockchain
PPTX
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
PDF
Week11
PPTX
Accelerate Blockchain slideshare
PDF
Eng12
PPTX
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
PDF
affTA00 - 14 Daftar Pustaka
PPTX
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Network security
Infosec Europe 2017 Highlights | Lastline, Inc.
Cybersecurity and its oppoutinities
Monoliths, Myths, and Microservices
Firepower ngfw internet
The End of the Fortress: The new Approach to Cybersecurity
Web hacking using Cyber range
Blockchain
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Week11
Accelerate Blockchain slideshare
Eng12
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
affTA00 - 14 Daftar Pustaka
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Ad

Viewers also liked (12)

PDF
Vent.PDF
PDF
2971 servicios premier
PPTX
Incident response
PDF
November 2012pg1
PDF
Αίθουσα δεξιώσεων βάπτισης | athenshall.gr
PPTX
MTI(LKI) - Company Profile
PPTX
How the Rules Are Made - KDADS
DOCX
MKT 571 Final Exam Answers 2015 version
PDF
Cleber Lucas, presidente da ABAC
PPTX
презентация на 16 апреля с новым фоном
PPTX
key terms of common wealth literature
DOCX
Las Manos Sucias de Chevron (Árbol de Categorías )
Vent.PDF
2971 servicios premier
Incident response
November 2012pg1
Αίθουσα δεξιώσεων βάπτισης | athenshall.gr
MTI(LKI) - Company Profile
How the Rules Are Made - KDADS
MKT 571 Final Exam Answers 2015 version
Cleber Lucas, presidente da ABAC
презентация на 16 апреля с новым фоном
key terms of common wealth literature
Las Manos Sucias de Chevron (Árbol de Categorías )
Ad

Similar to SAFE Network Presentation Bitcoin Meetup (20)

ODP
Maidsafe presentation
PPSX
Geek Night 15.0 - Touring the Dark-Side of the Internet
PPTX
Open Source & Cybersecurity
PDF
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
PDF
Security events in 2014
PPTX
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
PDF
Zero Day Malware Detection/Prevention Using Open Source Software
PDF
2022-Devnexus-StatefulMicroservices.pptx.pdf
PDF
Ultimate hybrid cloud: World Wide Cloud
PDF
Ultimate hybrid cloud
PDF
Introduction to Filecoin
PPTX
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
PDF
FreedomBox & Community Wi-Fi networks
PPTX
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
PDF
Securing Your Containers is Not Enough: How to Encrypt Container Data
PPTX
Q Con New York 2015 Presentation - Conjur
PDF
The State of Decentralized Storage
PDF
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
PPTX
Helen Tabunshchyk "Handling large amounts of traffic on the Edge"
PDF
Distributed edge cloud: empowering the IoT revolution
Maidsafe presentation
Geek Night 15.0 - Touring the Dark-Side of the Internet
Open Source & Cybersecurity
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Security events in 2014
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Zero Day Malware Detection/Prevention Using Open Source Software
2022-Devnexus-StatefulMicroservices.pptx.pdf
Ultimate hybrid cloud: World Wide Cloud
Ultimate hybrid cloud
Introduction to Filecoin
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
FreedomBox & Community Wi-Fi networks
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
Securing Your Containers is Not Enough: How to Encrypt Container Data
Q Con New York 2015 Presentation - Conjur
The State of Decentralized Storage
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Helen Tabunshchyk "Handling large amounts of traffic on the Edge"
Distributed edge cloud: empowering the IoT revolution

Recently uploaded (20)

PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
Sims 4 Historia para lo sims 4 para jugar
DOCX
Unit-3 cyber security network security of internet system
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
E -tech empowerment technologies PowerPoint
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
Funds Management Learning Material for Beg
PPTX
Introduction to Information and Communication Technology
introduction about ICD -10 & ICD-11 ppt.pptx
Power Point - Lesson 3_2.pptx grad school presentation
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PptxGenJS_Demo_Chart_20250317130215833.pptx
WebRTC in SignalWire - troubleshooting media negotiation
presentation_pfe-universite-molay-seltan.pptx
Slides PDF The World Game (s) Eco Economic Epochs.pdf
international classification of diseases ICD-10 review PPT.pptx
Sims 4 Historia para lo sims 4 para jugar
Unit-3 cyber security network security of internet system
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
E -tech empowerment technologies PowerPoint
Cloud-Scale Log Monitoring _ Datadog.pdf
SAP Ariba Sourcing PPT for learning material
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Slides PPTX World Game (s) Eco Economic Epochs.pptx
SASE Traffic Flow - ZTNA Connector-1.pdf
Decoding a Decade: 10 Years of Applied CTI Discipline
Funds Management Learning Material for Beg
Introduction to Information and Communication Technology

SAFE Network Presentation Bitcoin Meetup

  • 1. The SAFE Network by Maidsafe Massive Array of Internet Discs Secure Access for Everyone Dirk Hoving – Project SAFE Amsterdam Special thanks to the Maidsafe team (especially @ioptio's framework) and the rest of the community.
  • 2. Why Maidsafe? ● Internet access is highly dependent on centralized servers ● Traffic peaks make websites slow and susceptible to DDOS. ● Cost of maintaining and securing servers causes monopolisation. ● Current internet is susceptible to censorship. ● Many centralised servers get hacked ● Blockchain tech is hard to scale, there must be a better way to get consensus on ownership distribution
  • 3. SAFE Network origins ● Founded by David Irvine in 2006. Inspired by ant colonies, more than 9 years in the making. ● More is different: complexity at large scale from simplicity at a small scale ● Ants have different roles, can switch roles, very adaptable ● Specialization, adaptability, communication and large numbers ● Crowdfunded in 2014, bitcoin caused an additional wave of interest
  • 4. MAID ● Massive Array of Internet Discs ● Combining storage space, bandwith and CPU power ● Hardware combined into one global cyberbrain ● Anyone with device+internet connection can create vault ● MAID is what enables SAFE
  • 5. Image by Paige Peterson
  • 6. Vault roles ● Storing data ● Data managers (managing data for other vaults) ● Verifying and validating other vaults ● Groups of 32 randomly chosen of which 28 need to reach consensus. ● Nodes not behaving properly get outranked
  • 7. Data distributing ● Data split into 1MB chunks ● Each chunk stored at least 4 times ● All chunks are stored in a location depending on the hash of the chunk. Each chunk has a different location. ● Self encryption. Need all chunks to decrypt the whole. ● Parallel downloading of 1MB chunks makes data retrieval incredibly fast.
  • 8. SAFE ● Secure Access for Everyone ● Variety of encryption layers ● Privacy, security, freedom ● Self Authentication → no password information leaves your computer ● Store data, privately, shared or public ● Build and use applications that interact with this data
  • 9. Safecoin and farming ● Integrated cryptocurrency. No distributed ledger in the form of a blockchain. ● Proof of resource will farm you safecoin ● Uploading data to the network costs safecoin. Safecoin is recycled and given back to the network. ● 10% of farming rewards go to app developers ● Micropayments, instant verification ● Reward content creators, cut out the middleman
  • 10. The way forward ● Installers for linux coming this or next week. Other operating systems following shortly. ● Development bundle 1 being released this or next week (simple vaults, LAN only) ● Couple of sprints for development bundle 2 (community run vaults and farming integration) ● Development bundle 3 (safecoin full implementation, POSIX API and messaging API)
  • 11. Final notes ● Maidsafe website: http://www.maidsafe.net ● Maidsafe forum: http://www.maidsafe.org ● SAFE Amsterdam meetups: http://www.meetup.com/projectsafe-amsterdam/ ● Questions?