Skip to content

Principles

  1. Just one key. (Securing one is hard enough.)
  2. Commoditize data.
  3. Automate conflict resolution.
  4. Minimize host knowledge of users and their data.
  5. Limit maximum damage from a malicious host to withholding data. Prevent data injection (spoofing).
  6. Prevent cross-host identification of users and their data.