Principles
- Just one key. (Securing one is hard enough.)
- Commoditize data.
- Automate conflict resolution.
- Minimize host knowledge of users and their data.
- Limit maximum damage from a malicious host to withholding data. Prevent data injection (spoofing).
- Prevent cross-host identification of users and their data.

