Digital tokens on the SAFE network

home link

reference material Whitepaper.pdf


61.82 KRW
Exchanges that listed the coin
To be released
Project introduction

"Safe Coin is a digital token that is automatically generated by the SAFE network and resides on the SAFE network MaidSafeCoin is a proxy token released during MaidSafe's crowded sale and is replaced with Safecoin on a 1: 1 basis when Safecoin is released. "

Executives and partners
There is no executive team information at this time
Please leave a message of support for the team

There is no partner information at this time
Please leave a message of support for the team

go to leave a message

Latest News

There is no news posted at the moment
Please leave a message of support for the team

go to leave a message


MaidSafe Releases Baby Flem...

MaidSafe announced in its regular weekly update that it was releasing the first version of its standalone Network calling it Baby Fleming.What is Baby Fleming?To know what Baby Fleming is, first we need to understand what the Fleming milestone is.MaidSafe on Fleming:SAFE Fleming NetworkThe next major milestone for the SAFE Network. Whilst the Shared Vault Network will continue to function, this will be a standalone Network that will enable individuals to run Vaults — decentralised storage from home computers. The release of Fleming will be notable for many reasons, not least the fact that with data storage, the Network will now also contain Test Safecoin.You can read more about Fleming here in a community post by user pierrechevalier83 or here on Medium in a blog post written in October 2018 by the MaidSafe team.In a nutshell; Fleming takes all of the critical components of the network, and sticks them together to see what happens. It’s kind of like putting new ingredients onto a pizza base, sticking it in the oven and tasting it after to see if it works or not.More specifically Baby Fleming isabout iterating from a single vault network into a multiple vaults (single-section) network. From a user perspective, the exact same type of operations and use cases as Vaults Phase 1 are being supported by Baby Fleming, i.e. test-safecoin, wallets, files, NRS names, SAFE sites, etc.For now, users will have to set up their own local networks. MaidSafe has indicated that a shared public network is currently being worked on and will be available soon.To find out the specifics of what is included in this release head on over to the forum. Better yet, create an account, sign up and start chatting.Until next time, ARMaidSafe Releases Baby Fleming: Version 1 of Standalone Network was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


20. 03. 08

Oh no! Poloniex delists Mai...

Image credit: friends and fellow SAFE Network fans.On December 21st Crypto Currency Exchange Poloniex announced it will delist the SAFE Network cryptocurrency MaidSafeCoin (MAID). You can read their post here.There have been all sorts of theories behind the actual reason Poloniex decided to delist MAID, none of which I will get into here because it is what it is. If you’d like to theorize and discuss, head on over to the SAFE Network Forum or the SAFE Network subreddit.The important dates specified by Poloniex are as follows:December 30th at 17:00 UTC: Trading of DGB, FCT, MAID, OMNI, XPM, VTC, and VIA will be disabled.January 30th at 17:00 UTC: Withdrawals of these assets will be permanently disabledIn other words, trading has already been disabled and you have until January 30th, 2020 to withdraw any remaining MAID.What to do next?If you want to invest, buy, sell and trade your options are as follows:Bittrex, HitBTC & Chainrift.I have personally decided to go with ChainRift for several reasons. They are US based and allow US customers (except for a few states), many fellow SAFE Network fans are doing the same based on public forum discussions which should raise the volume but also it was a recommendation that came from CEO of MaidSafe himself, David Irvine via this forum post.I have since signed up for ChainRift. The process has been flawless thus far. I cannot comment too much and or provide a real in-depth review as I have not yet traded or withdrawn, however, I can say that the user interface is very user-friendly and it seems to be very fast, I believe my deposit happened in under 20 minutes.2020 should be a big year for the MaidSafe team and the network.If you have not already, head on over to ChainRift and create an account.If you are unsure about which way to proceed forward, there are other options. Fellow SAFE Network fan and forum member @dimitar posted this very helpful guide wherein he goes through several different methods of withdrawing and protecting your MAID including Omniwallet and hardware wallet options.See you all in the new decade!P.S. Don’t forget to sign up for ChainRift, that is where many of us envision most of the volume in the new year!Oh no! Poloniex delists MaidSafeCoin (MAID). Fear not! Here’s what to do next was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 12. 31

MAID Relisted on ChainRift

As you may have heard, Poloniex has decided to delist MaidSafeCoin (MAID), perhaps because of its new relationship with Justin Sun. Obviously we are disappointed by this turn of events. The Poloniex exchange is about to lose one of the oldest and strongest communities in the crypto world. However, we are making the most of this situation by broadening the base of exchanges listing MAID, which will give more choice to the market, particularly in the US.After the news came out, ChainRift reached out to us saying that they are fans of the project and would be happy to support our community.ChainRift is an exchange that really takes care of their users and you can see that from their Trust Pilot score which is the best in the industry.We are happy to announce that MAID was relisted on ChainRift today. Trading for MAID/BTC trading pairs is open now!As you may remember, MAID used to be listed on ChainRift but there was no volume at the time due to many factors. The story is very different now. We need solid exchanges and ChainRift looks to be just that.We’ll be providing some early liquidity to ChainRift and we’re delighted to offer another trading option for those in the community who have been keen to find an alternative place to trade their MAID.The ChainRift team will be answering questions in this forum topic and also on Reddit and we’d encourage you all to ask them any questions that you might have.P.S. Don’t forget to share your ChainRift referral link, it lets you cash in on their fees sharing program that is one of the most generous out there.MAID Relisted on ChainRift was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 12. 27

MAID Relisted on ChainRift

As you may have heard, Poloniex has decided to delist MaidSafeCoin (MAID), perhaps because of its new relationship with Justin Sun. Obviously we are disappointed by this turn of events. The Poloniex exchange is about to lose one of the oldest and strongest communities in the crypto world. However, we are making the most of this situation by broadening the base of exchanges listing MAID, which will give more choice to the market, particularly in the US.After the news came out, ChainRift reached out to us saying that they are fans of the project and would be happy to support our community.ChainRift is an exchange that really takes care of their users and you can see that from their Trust Pilot score which is the best in the industry.We are happy to announce that MAID was relisted on ChainRift today. Trading for MAID/BTC trading pairs is open now!As you may remember, MAID used to be listed on ChainRift but there was no volume at the time due to many factors. The story is very different now. We need solid exchanges and ChainRift looks to be just that.We’ll be providing some early liquidity to ChainRift and we’re delighted to offer another trading option for those in the community who have been keen to find an alternative place to trade their MAID.The ChainRift team will be answering questions in this forum topic and also on Reddit and we’d encourage you all to ask them any questions that you might have.P.S. Don’t forget to share your ChainRift referral link, it lets you cash in on their fees sharing program that is one of the most generous out there.MAID Relisted on ChainRift was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 12. 27

The Curse of a Cashless Soc...

Photo by Gus Moretta on UnsplashLast month, the British Retail Consortium (BRC) released a report showing that shoppers spent more on their credit cards than with cash last year. While the use of debit cards overtook cash a few years ago, this is the first time that credit has done so. Today cash makes up 20% of all transactions in the UK, with the remaining 80% being plastic — or more accurately, digital. And worryingly, the current rate means that cash could well and truly be dead in another 10 years.Some argue that removing cash will reduce crime and help us build better solutions with the technology available to use today (it’s hard to argue that tapping your card is much easier than fumbling in your pocket for coins). To others, cash is essential for some of the more vulnerable in society: the poor, the disabled, or those who just need the physicality of cash to help with budgeting. But both these arguments miss something pretty important. In a cashless society, our financial life is no longer private.Why Killing Cash Can Be AttractiveBut why do countries ‘go cashless’ in the first place. Take Sweden, for example. It’s a widely used example of a modern cashless society. It’s often seen as a progressive country that stands as a beacon of a new societal relationship with money. But how did it get to that point? Technology does not act in isolation. For real societal change, you must also examine how social conditions that foster alongside, or even more accurately, intertwined in the technology.Sweden is no different. While the adoption of digital technologies, of course, played a large role, something more unique triggered the acceptance of this move away from cash. An increase in robberies across banks and shops during the mid-2000’s influenced the view on how cash was perceived. Between 2004 and 2005, robberies rose from 8,590 to 9,298 — an increase of over 9% in just one year. But it wasn’t until 2009 when the infamous Västberga helicopter robbery occurred that a new emotional relationship with cash was forged, edging Sweden on its way to a new era.Meanwhile in the East, China adopted the concept of a cashless environment as a form of social control. The well-reported social credit system is intrinsically linked to individuals’ wealth and spending habits. How better to control a nation than to ensure all their payments are made digitally? The people who sold the benefits of mobile wallets said it would reduce counterfeit notes, increase security and of course help bolster their social credit scores. Unlike some of the European countries, China leads the way in the mobile wallets and peer-to-peer payments and has initiatives in place to seize Sweden’s crown in becoming the world’s first cashless society.Why Cashless is Isn’t The AnswerThe social relationship with money is incredibly complex that we can’t do justice here. The reasons that explain why countries go cashless are many — and not always as simple as promised. But let’s take a look at a few.When it comes to increased security, the argument is somewhat flawed. Stories of hacking and unlawfully accessing individuals’ data and information are rife. Not a single day goes past without some attack, or attempt, taking place around the world.The other pertinent issue is control or lack thereof. Without cash, our money is bound by gatekeepers, and underhandedly nefarious gatekeepers at that. A sweeping statement, but Banks are untrustworthy. A survey in 2018 showed 66% of the UK population don’t trust banks. The moment you entrust your hard-earned savings to a third party, you assume an additional risk to the future of your family which you need to manage with costly insurance and trust that further regulations will protect you. It’s a fear that becomes all the more terrifying if you’re stuck in a politically unstable or corrupt country.The presence of an intermediary means every transaction is recorded, and nothing can be done without that overseeing eye. Our privacy is at once eroded and destroyed as the arms race begins for the biggest collection of economic data. Whilst you can track where your money is going, so can others — and they often have different priorities that aren’t aligned with your own.Are Cryptocurrencies the Solution?Cash has unique properties. It’s physical, you can touch it. Cash can be spent anonymously. We’re untraceable. And while yes, it can be stolen or lost, it can’t be assumed that these issues disappear in digital markets. But if the answer isn’t reverting back to cash-only societies, so could this new breed of cryptocurrencies solve these problems?In a blunt answer, no. While cryptocurrencies can solve answer many problems in our economic system, not all currencies are created equal. Blockchain-based currencies are usually on a public ledger. Great when transparency is essential (tracking government spending for example), but nightmarish for your own personal expenses. Anonymity, in general, tends to lack from many crypto payments. Take Bitcoin. All transactions are stored publicly and permanently on the Network, which means anyone can see the balance and transaction history of any Bitcoin address.But there is light at the end of the tunnel. There are some crypto projects out there that have privacy baked-in, not just as a consideration but essential to their product. Zcash and Monero are oft-referenced examples but our very own Safecoin has all the properties than enable a truly private coin.So while the future might be storming towards a cashless society, we’re ok with that. We have a solution with privacy baked-in. And as our coin isn’t built on a blockchain, there’s no public ledger. Only the current and previous owner of each coin are known to each other. So you can be paid in private.You can find out more about Safecoin over on our website.The Curse of a Cashless Society was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 10. 16

The SAFE Network September ...

With autumn just around the corner and the nights closing in, the team are continuing to steam ahead in delivering you the SAFE Network. Here’s a quick recap of some of the key events in September 2019.Front EndThe Front End team gave us a glimpse into the future of the web by introducing the first of the Perpetual Web functionality. The updated browser (check out the features here), now arms you with the ability to check historic versions of all websites by simply toggling back and forth to see the differences. Download it here and try it out for yourself! If the concept’s new to you, here’s a quick reminder about why the Perpetual Web is so important.Staying in browser land is the SAFE Mobile Browser. We already have two iterations out in the world and we’re currently working away at the project, including implementing the perpetual functionality that’s present in the desktop version — more updates to come on this soon!We also released updates to the SAFE Authenticator, building on some fantastic contributions from the SAFE community. Plus we introduced a new SafeKeys transfer command to the SAFE CLI, and its API. This enables users to transfer coins from a SafeKey, while the Safe Wallet transfer command still allows users to transfer coins from Wallets.Back EndAfter the release of Vaults Phase 1 and the inevitable bug fixes, we’re now full steam ahead on the implementation of Phase 2. The plan, as ever, is to deliver a minimum viable product into the hands of the community and then iterate on top. To do this, we’ve split Phase 2 into two sections (2A and 2B) which helps us work at pace:Phase 1 gave you the ability to run a single local Vault;Phase 2A extends the single Vault to multiple Vaults within a single Section;Phase 2B builds on 2A to bring multiple Vaults in multiple Sections.We’ll then move on to Phase 3 and 4 (more details in a future post, but think Farming and Node Ageing amongst a host of other things). You definitely want to keep up to date with progress as it happens.MarketingOur CEO David presented at the Turing Festival in Edinburgh, presenting the vision of securing the hardware, not the data and speaking in front of a more general tech crowd, Dug was down at the Blockchain Live conference in London, Lionel and Nikita chatted about Vaults Phase 1 on the fantastic SAFECrossroads podcast (definitely one to listen to) and we’ve also published a heap of new content this month. So if you haven’t yet taken a look, grab a coffee, get comfortable and enjoy!screencasts on navigating the new Safe CLIs;a video on how to build a site on SAFE using three simple commands;a guide to the new data types on the Network that helps explain the different types and how they can be used; anda deep dive piece into what’s included in the Vaults Phase 1 release which you should find very informative.See you next month for a whole host of new news and updates — and plenty more releases. As always, check out the Forum each Thursday and stay in tune with the updates each week. As an open-source project, we’re always looking for feedback, comments and community contributions — so don’t be shy, join in and let’s create the SAFE Network together.The SAFE Network September Round Up was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 10. 09

New release: Perpetual Web ...

Photo by Ales Nesetril on UnsplashWe’ve got some very exciting news to share: we’ve released the first working version of the Perpetual Web browser!What is it?The Perpetual Web is a concept in which public data can live indefinitely, free from censorship and manipulation: a Network of truth. You may already be familiar with the wider principles surrounding the Perpetual Web. If not, take a look at this high-level overview video and Medium post which expands upon the reasons why permanency is such a key foundation for our future. This release is now bringing the first of these features to life and implementing them in the real world.So what exactly does it allow me to do?You can do all the things that were previously possible on the previous SAFE Network browser. But you can also do much more.First, you can fetch websites using NRS-URLs and XOR-URLs (which are both types of URL’s on the Network) and toggle between the site’s version history. This shows you the differences and edits in each version. That means full transparency around any changes and when they were made.This release also has a neat feature that gives you the option of creating an NRS name (the SAFE Name Resolution System) if it hasn’t yet been registered. If you try to visit a site with an NRS name that doesn’t yet exist, you’ll get the option to register that NRS name (which will then be owned by your account).Plus, if you have a pre-existing website on the SAFE Network, you can now edit directly from the Browser. By selecting a local folder, it automatically uploads it and republishes it in your name and URL — sweeeet!Also, as an alternative, sites can also be uploaded and published on an NRS name using the SAFE CLI so once published they can be fetched either with the CLI or with the SAFE Browser. Quick note: it’s not possible yet to edit a website using the Browser if it was uploaded using the CLI — or vice versa. This is a temporary limitation that’ll we’ll be removing soon to enable supporting sharing permissions among apps. This offers users extra flexibility when deciding how to upload files to the Network.This sounds great — where do I get this from?Just head over to GitHub and download. Quick reminder: you’ll need a couple of things in place first:Make sure you have the SAFE_auth runningYou need to be connected to a shared or local Vault (i.e. this doesn’t work with Alpha 2). Here’s the Guide to get set up with Vaults if you haven’t already.So now we have the first working parts of the Perpetual Web out in the wild. As an open-source project, we’re always looking for feedback, comments and community contributions so don’t be shy — head over to the Forum and let’s create the SAFE Network together.New release: Perpetual Web Browser was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 10. 03

Dawn of the Deepfakes

Photo by h heyerlein on UnsplashWe’ve been living in a post-truth world for some time now. A world where the standard for ‘truth’ has disintegrated and the understanding of fact and fiction is wasting away under piles of opinions, alt-facts, fake-news and, quite frankly, a hell of a lot of bullshit. And one of the factors contributing to this rather dystopian world is deepfakes.Deceptively authentic, deepfakes are the product of advances in the field of Deep Learning, a form of Artificial Intelligence. Deepfakes emerge from a specific type of deep learning in which pairs of algorithms are pitted against each other in “generative adversarial networks,” or GANs. Without getting too technical, the algorithms ‘train’ against each other and the machine learns autonomously — meaning the more they learn, the more developed they become — and the more realistic a deepfake can be.But where did this come from? Like a lot of technology, it has origins in two worlds: internet communities and the halls of academic research.Academically, deepfakes came to light in 1997. A project called Video Rewrite modified existing footage of a person speaking, changing the words that were coming from the actor’s mouth in an advanced form of dubbing, a common technique used in movies. While dubbing normally made no attempt to match the movement of the actor’s mouth with the voiceover, the Video Rewrite project used computer-vision techniques to track points on the speaker’s mouth so it could make it appear like they were speaking the words.The term we know today however apparently originates from a Reddit user called ‘deepfake’, circa 2017. A thread called r/deepfake soon followed, and became filled with doctored images famous people and then, as you can imagine, the porn soon followed with celebrities heads superimposed upon pornographic video. And, for some reason, there was an awful lot of Nicholas Cage showing up in movies…Creating deepfakesWhile one would need a pretty strong grasp of computer science and lots of time to create a robust attempt at a deepfake that looked real, there are now off the shelf apps such as Zao, a deepfake face-swapping app which has already gone viral in China. The app enables you to upload a photograph and insert yourself into hundreds of movies and TV shows apparently within seconds. You can see this Twitter user showing his deepfake based on one image:So the arrival of Zao, while only available in China, is just an example of how close this is to becoming mainstream. The spread of these services will lower the barriers to entry (note: Zao is free). Soon the only constraint on one’s ability to produce a deepfake will be your imagination. While superimposing yourself into a movie is fairly harmless, this can lead to some pretty serious issues (even aside from the privacy concerns around the data Zao collects).We’re taught to believe what we see. Yet without a diligent lens for visual digital literacy, the likelihood of falsehoods being perpetuated by such content is incredibly high. It’s what artists Bill Posters and Daniel Howe, the duo who created the Kim Kardashian and Mark Zuckerberg deepfakes of 2019, call “computational propaganda”.Fighting FakesSo recently, Facebook announced, in conjunction with Microsoft and a handful of universities, that it’s launching an initiative to develop technology for detecting deepfakes. The Deepfake Detection Challenge (DFDC) intends “to produce technology that everyone can use to better detect when AI has been used to alter a video in order to mislead the viewer.” The DFDC will give technologists and developers a sample data set to work with, alongside grants and rewards to incentivise participation.But instead of merely firefighting this threat of manipulation, how about a Network that removes the haziness?The SAFE Network has a unique proposition: Perpetual Data. Like the Internet Archive, the web lives forever on the Network, open to all to dig around the history of a page like a digital archaeologist. Plus the Network keeps track of the updates to every site automatically — so every site edit is stacked on top with the sequence of events recorded in the site’s history (not simply removed and forgotten). It’s a permanent digital archive, available to all humanity.So how would this work in this case?Say you publish a video of you speaking publicly at an event. You would be the verifiable publisher of that content, using an ID which others can also validate the content against. Now imagine some doctored deepfake versions start appearing. While this data can’t be taken off the Network, you have evidence that these copies are not from you — you simply need to highlight the ID of the publisher and compare the dates, which would clearly be published after the original version.The SAFE Network can’t stop computational propaganda or ensure all content on the Network is truthful. Nor would it try to. But we can — and are — building a Network of truth that removes gatekeepers and allows anyone to join. And because the Network is autonomous, it self-manages, self-governs and, fundamentally, is free from manipulation by individuals or groups. The Network can’t be shut down, nor censored, nor controlled. So join the community and be part of the new future.Dawn of the Deepfakes was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 09. 24

Dawn of the Deepfakes

Photo by h heyerlein on UnsplashWe’ve been living in a post-truth world for some time now. A world where the standard for ‘truth’ has disintegrated and the understanding of fact and fiction is wasting away under piles of opinions, alt-facts, fake-news and, quite frankly, a hell of a lot of bullshit. And one of the factors contributing to this rather dystopian world is deepfakes.Deceptively authentic, deepfakes are the product of advances in the field of Deep Learning, a form of Artificial Intelligence. Deepfakes emerge from a specific type of deep learning in which pairs of algorithms are pitted against each other in “generative adversarial networks,” or GANs. Without getting too technical, the algorithms ‘train’ against each other and the machine learns autonomously — meaning the more they learn, the more developed they become — and the more realistic a deepfake can be.But where did this come from? Like a lot of technology, it has origins in two worlds: internet communities and the halls of academic research.Academically, deepfakes came to light in 1997. A project called Video Rewrite modified existing footage of a person speaking, changing the words that were coming from the actor’s mouth in an advanced form of dubbing, a common technique used in movies. While dubbing normally made no attempt to match the movement of the actor’s mouth with the voiceover, the Video Rewrite project used computer-vision techniques to track points on the speaker’s mouth so it could make it appear like they were speaking the words.The term we know today however apparently originates from a Reddit user called ‘deepfake’, circa 2017. A thread called r/deepfake soon followed, and became filled with doctored images famous people and then, as you can imagine, the porn soon followed with celebrities heads superimposed upon pornographic video. And, for some reason, there was an awful lot of Nicholas Cage showing up in movies…Creating deepfakesWhile one would need a pretty strong grasp of computer science and lots of time to create a robust attempt at a deepfake that looked real, there are now off the shelf apps such as Zao, a deepfake face-swapping app which has already gone viral in China. The app enables you to upload a photograph and insert yourself into hundreds of movies and TV shows apparently within seconds. You can see this Twitter user showing his deepfake based on one image:So the arrival of Zao, while only available in China, is just an example of how close this is to becoming mainstream. The spread of these services will lower the barriers to entry (note: Zao is free). Soon the only constraint on one’s ability to produce a deepfake will be your imagination. While superimposing yourself into a movie is fairly harmless, this can lead to some pretty serious issues (even aside from the privacy concerns around the data Zao collects).We’re taught to believe what we see. Yet without a diligent lens for visual digital literacy, the likelihood of falsehoods being perpetuated by such content is incredibly high. It’s what artists Bill Posters and Daniel Howe, the duo who created the Kim Kardashian and Mark Zuckerberg deepfakes of 2019, call “computational propaganda”.Fighting FakesSo recently, Facebook announced, in conjunction with Microsoft and a handful of universities, that it’s launching an initiative to develop technology for detecting deepfakes. The Deepfake Detection Challenge (DFDC) intends “to produce technology that everyone can use to better detect when AI has been used to alter a video in order to mislead the viewer.” The DFDC will give technologists and developers a sample data set to work with, alongside grants and rewards to incentivise participation.But instead of merely firefighting this threat of manipulation, how about a Network that removes the haziness?The SAFE Network has a unique proposition: Perpetual Data. Like the Internet Archive, the web lives forever on the Network, open to all to dig around the history of a page like a digital archaeologist. Plus the Network keeps track of the updates to every site automatically — so every site edit is stacked on top with the sequence of events recorded in the site’s history (not simply removed and forgotten). It’s a permanent digital archive, available to all humanity.So how would this work in this case?Say you publish a video of you speaking publicly at an event. You would be the verifiable publisher of that content, using an ID which others can also validate the content against. Now imagine some doctored deepfake versions start appearing. While this data can’t be taken off the Network, you have evidence that these copies are not from you — you simply need to highlight the ID of the publisher and compare the dates, which would clearly be published after the original version.The SAFE Network can’t stop computational propaganda or ensure all content on the Network is truthful. Nor would it try to. But we can — and are — building a Network of truth that removes gatekeepers and allows anyone to join. And because the Network is autonomous, it self-manages, self-governs and, fundamentally, is free from manipulation by individuals or groups. The Network can’t be shut down, nor censored, nor controlled. So join the community and be part of the new future.Dawn of the Deepfakes was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 09. 24

Building a Site on SAFE in ...

With the release of the new CLIs, here’s a small guide to help you make use of the CLI and build a site on the SAFE Network in three simple commands.But first, let’s get you set up!What you’ll need before we start;SAFE CLI downloadedSAFE_auth downloadedHelpfully, we’ve got a guide on how to download both of these, plus user guides for both SAFE_CLI and SAFE_auth that we’d recommend you have handy as they give you a detailed overview of what functionality each give you. Once you have the SAFE_auth daemon running locally (this is in the guide too), we’re ready to begin!$ safe auth will enable the authorisation and save the authentication locally for you. It should look something like this…Command One: Uploading dataSo now, let’s say you have a local folder mysite that contains index.html and css/styles.css so it’s not ugly.$ safe files put -r mysite/This will upload your folder to the SAFE Network. The / at the end is important to set the root of your newly created FilesContainer to be mysite (and not have mysite as a folder within it). You can read more about this in the safe-cli User Guide 2.It will in return, print out some info about your new files on the network. The Files Container URL is important and we’ll need it for the next step…Command Two: Creating a Public NameThe SAFE Network uses a distributed NRS to allow you to register URLs (but without any third party). NRS means Name Resolution System and the easiest way to think about it is how SAFE lets you have human-readable urls.To do that and register a site, such as thesite:$ safe nrs create thesite -l "<link to FilesContainer URL>?v=0"?v=0 is needed here to specify a version to point to. The SAFE Network principles note that all public data must be versioned. And this way, we can easily track any/all changes to a Public Name.And now, you can check your site on the network via;$ safe cat safe://thesite/index.htmlCommand Three: Updating your FilesThe SAFE Network distinguishes between updating a FilesContainer, and updating an NRS Name. The latter, must always be versioned (as we saw above).When you have changes to your site, you can update your NRS using the files api thus:$ safe files sync -r ./mysite/ safe://thesite -u -d -r-u here updates the corresponding NrsContainer as well as the FilesContainer, so your changes will be reflected at safe://thesite. -d signifies that any deleted files will be deleted in the next version of the containers, too. -r is again, to sync recursively.And now, if you access safe://thesite/index.html, you’ll see your changed files:Not only can you update your site easily, but inherent in the SAFE Network is versioning. What this means is that you can actually access older versions of a site via the version query param: $ safe cat “safe://thesite?v=0”, will show you your first content, for example. Pretty neat huh?So you’ve played around with these Command Lines. But what if you want to actually see your site in action? we have a browser proof of concept available for download that works with the above CLIs and of course, Vaults too. However, please note this only works for Linux and Mac just now, with Windows to follow soon.…So after this, you’re probably thinking: why doesn’t the internet today do this?! Why do I have to faff around with domain registrars, pay money and not own my stuff. Why do I need a server?We agree, hence why we’re one a single mission to build the SAFE Network. A permissionless network that removes faff, servers and allows you to just start developing. Why not join us?Building a Site on SAFE in Just Three Commands was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 09. 19

What’s included in Phase 1 ...

So you’ve come looking for some more information on what we’ve included in this Phase 1 Vaults release? Well, you’ve come to the right place! We’ve tried to keep this fairly non-technical. However, if anything is unclear or you need any support, head over to the Forum where the team and community will be ready and waiting to answer your questions.Data TypesWe’ve implemented the 8 data types as defined in the Data Types RFC’s(0054 and 0055) which can, very simply, be categorised into Public (or Published) and Private (or Unpublished). We’ve got a standalone post which explains these types in more detail but in essence, they give every user ultimate control over how to maintain his or her data.Public data is the content you publish to the Network that everyone can see it. This is the Perpetual Web in action. Private data, on the other hand, is slightly more nuanced and brings to life the concepts around Take Control of Your Data that you might have heard us discuss before.Test SafecoinWe’ve implemented the basic functions defined in the Safecoin RFC (including creating balances, coin transfers, and transactions).SAFE CLIThe CLI (Command Line Interface) provides many of the commands necessary to interact with the SAFE Network, including storing and browsing, finding data and using Wallet-related commands. It is worth noting that while we’re implementing all the data types, the CLI will only use a selected range (see later in this post).At this point, we’re showcasing functionality. We haven’t implemented a GUI because we want to let you get closer to the action and interact with a greater degree of control without having to navigate around a GUI. This makes it perfect for developers, as you will have the permission to access many of the operations that can be made on SAFE Network data. It will allow you to also use it for automated scripts in a piped chain of commands, for example.By developing the Network in this way, we’re able to decouple the GUI development from the back-end functionality of those GUI apps. With the CLI and its API being separate, we can test the operations needed to manipulate data on the Network more efficiently, by having automated tests and by using the CLI itself. Once this layer is solid and stable, developing a GUI is a more straightforward task (as the expected underlying functionality has been validated).So what can the CLI do?First off, the CLI needs to be authorised by you before it can access your account. Therefore, you’ll need to first authenticate yourself via the SAFE Authenticator CLI (all the details can be found here).Currently, you can use the following data types:Create files (via the PublishedImmutable data type)Set up NRS (PublishedAppendOnly)Access a Wallet and its commands (UnpublishedAppendOnly)Creating filesAs we’ve mentioned, you can upload files to these Vaults. We’ve got a super-clear guide here on how to do this, as well as details of what you can do with your data once it has been uploaded. But here’s a quick overview here of how it works…Data is uploaded to the Vaults and stored as Published ImmutableData files (head to this post for all the details on the different data type). That data is stored in a container which maps the data path together with the corresponding ImmutableData NRS (more details below). And this map is stored on the Vault within a special container called FilesContainer, which is stored as Published AppendOnlyData data. Simples!NRSNRS means Name Resolution System. The easiest way to think about it is how SAFE lets you have human-readable URLs.Each piece of data on the Vault is held in a unique location with an associated XOR address name. This data can be accessed using the XOR address as a URL. Hence XOR-URL. We have been working on developing a more human-friendly URL system that can be easily remembered when trying to share them with other people or recognised quickly. Just like URLs on the current Internet today.As an example, compare a XOR — URL (safe://sadoiofsefohf89243hf9huheofhdoih289euhfafoishaoifdha893f2fh9eahfoiasef) with an NRS URL (safe://maidsafe). This human-friendly naming system can be used not just to find data on the Vault but also can be used as a URL to enable the sourcing of websites, web applications, files and folders. It can even be used in Safecoin wallets for receiving transfers, SAFE IDs, etc in a memorable format.Details on how to create your own NRS and how to work with others can all be found here.WalletsAs part of this release, we’ve included the Wallet in this CLI, which is a type of Container. A Container in this context means a structure to hold data (kind of like a folder). The Wallet holds your secret keys, which enable you to spend your Safecoin. The Wallet also holds the links to your SafeKeys, which holds your Safecoins. And importantly, everything that is stored in the Wallet is only accessible by you, the owner.Details on how to set up your very own Wallet, as well as adding test Safecoins, view your balance and make transfers can be found over here, as well as setting up your Keys.And that’s it! Next up, Phase 2. This will see the introduction of PARSEC, swiftly followed up by Phase 3 and 4 which will be iterative versions of the testnet, ultimately ending up in the implementation of Routing and, then…we have a Network! Make sure you keep up to date on progress by checking in each Thursday for the Dev Update or check out Twitter for the latest news and releases.What’s included in Phase 1 Vaults? was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 09. 11

New Release: Phase 1 Vaults

Photo by Denys Nevozhai on UnsplashLast week we were beyond delighted to announce that we released real Vaults and therefore, we’d landed the Phase 1 milestone! But what are Vaults, what’s Phase 1, and why’s this such big news?Going back to basics, the Network is essentially made up of three key components: Clients, Vaults and Routing. The work related to this release focuses on the first two: Clients and Vaults. But we’ll come back to Routing in a moment.The SAFE Network is made up of nodes which run Vaults. A Vault is a program that runs on a device which connects the device to the Network and manages the storage and other basic Network functions. Collectively, Vaults manage the storage of all data by managing the movement of chunks of encrypted user data that are stored across the Network. A Client, on the other hand, is a program that allows users to connect and use the Network. For this release, the Client is the SAFE Browser and the SAFE CLI.So how does Routing fit in?Routing is essentially the bit that connects Vaults to other Vaults. And at this stage, we’ll not be integrating Routing. Why? Put simply, focusing on Clients and Vaults sets up the foundations for the Network. We’ll add the Routing component (which we’ve been building in parallel) once this is up and running. Then you’ll be able to connect to other users (i.e. multiple Vaults) on the Network. And voila! Then you’ll be looking at the early version of a fully decentralised SAFE Network!We tend to talk about future users of the Network in three loose categories: Consumers (people using the Network to browse, share data, etc.), Creators (developers or those publishing content) and Farmers. If we take the first two groups, Consumers and Creators, this release was for you. Farmers, sorry you’ll have to wait just a little longer… but hopefully not too long…Hmmm, still not sure I get it?If you’re less technical, understanding how these three components work with each other can be a little tricky to get your head around. So let’s try an analogy to help contextualise what's happening here.Imagine these Vaults are islands. On your island, you’re fairly self-sufficient: you can build things and you can survive just fine. But you can’t connect with any other islands (Vaults) around the world.Now, to travel from one island to another, what you really need is a boat. With transport, all of a sudden you can connect to other islands and your life is now enriched. You can communicate and you can share resources. But most importantly? You’ve now joined a growing community. Swap out ‘boats’ for ‘Routing’ and I’m pretty sure you get the idea. Add the connections and Vaults now start to become so — so — much more.What’s included in this release?If you download the release, what are you going to get? How about the first stages of data types, test Safecoin and a user interface in the form of a CLI (a simple command-line tool with some fundamental features)? It’s the basic framework for the full Network — with many additional features to come.OK, I’m sold! How do I get involved?To use the new updates, you will be able to download a Vault binary (aka file!) which will run locally on your computer. Details and links can be found on this Forum post.So what’s next?While this Phase 1 Vault release is primarily to showcase the Network features to Consumers and Creators, we now turn to the Farmers — in other words, introducing the Vault’s capability to farm Safecoin. So further releases will be building on these previous versions. We’ll be decentralising the Vaults, introducing PARSEC, integrating with Routing, Secure Message Delivery, Reliable Message Delivery and BLS encryption.New Release: Phase 1 Vaults was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 09. 05

The SAFE Network August Rou...

Another month flies by and by golly, do we have some updates for you this month. Let’s go!Phase 1 vaults (real vault)The biqgie this month: we released Phase 1 vaults (real vault)! What does this all mean you ask? Essentially, this is the basic framework for the Network. By downloading the release, you’ll get to experience the first stages of data types, test Safecoin and a CLI user interface (in other words, a simple command-line tool with some fundamental features). We’ll of course continue to build many additional features and we’re already well on the way to scoping out Phase 2. We’re super excited about this, and you should be too. To find out more, and how to download, check out this User Guide.SAFE Mobile Browser v0.1.1 releasedWe also released both iOS and Android versions of the SAFE Mobile Browser this month. This was a magnificent team effort supported by many community members who carried out the testing on early versions of the browser. Check out the full details of what was released here.So how do we follow that? Well, we’re looking to add more standard browser features (such as multi-tabbing, browsing history and themes). With the advent of the Perpetual Web, soon users will be able to view the version history of their favourite site. So, once we have basic browser features in place, we’ll start to support Perpetual Web features on the mobile browser :thumbsup:SAFE Client LibsTowards the end of August, we released the new, public versions of the SAFE Client Libs libraries. While this release preserves the existing APIs, Routing has been removed as a dependency. That means the library is more lightweight and easier to understand. Additionally, because the library now uses QUIC-p2p (which has a number of important features including the network traffic anonymity), SAFE Network traffic will be indistinguishable from the usual Internet traffic. It becomes effectively uncensorable and untraceable. Win, win.And, of course, this release of the SAFE Client Libs is designed to work with the Phase 1 Vaults: it supports all the new data types (which are essential for The Perpetual Web) and it implements Safecoin too.SNAPPThe SAFE Network App (essentially the ‘start’ button to the Network that will enable the download, installation and management of the various types of SAFE apps and utilities) has been handed over to QA and going through robust testing as we speak. A decent amount of time was spent prior in the UX/UI phase, designing the flow and methods through which users will onboard to the Network for the first time, in a permissionless way, with no servers involved. Stay tuned for this imminent release!MarketingThere’s a few new pieces to read through if you haven’t already. We wrapped up the ‘Spotlight On’ series which took a deeper dive into each of the FE themes, with the final one being The New Digital Economy. We unpack the current model of the Internet which requires you to pay for your digital life with data and offers up the alternative solution that is Safecoin. Alongside this, we put out another opinion piece around what it means to be Permissionless in a world where we are surrounded by digital gatekeepers. Have a read, clap and share!EventsIt was a busy month for team travelling around Europe and the UK, spreading the word about the SAFE Network. With some of the team at Web3 Summit in Berlin, aiming to cut through some of the Blockchain noise, UX designer Jim was at the Brighton meetup sharing the UX/UI vision for the Network. CEO David spoke at the Turing Festival Edinburgh, in front of a slightly different crowd than we’re used to, but nonetheless they lapped up his vision for a digitally private future enabled by the Network. Check out some of the photos from all events below.And that folks, is a wrap. Join us next month for another round up of the key SAFE Network highlights, and as always, tune in every Thursday on the forum for the weekly dev updates.The SAFE Network August Round Up was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 09. 03

Removing the Gatekeepers: ...

Removing the Gatekeepers: The Promise of a Permissionless NetworkPhoto by Franck V. on UnsplashLook up permission in the dictionary and you’ll find that it comes from the Latin word ‘permissio’. It means granting someone the liberty to do something. In other words, someone has agreed that you can act as you wish. That might be a boss, a leader, a ruler — whatever. But how is permission relevant when it comes to the Internet?The Web today is very differentThe early days of the Internet were permissionless. When Tim Berners-Lee began building the World Wide Web, he didn’t ask permission. He just did it. And the doors of the Internet remained wide open — unless you chose to hide behind the walled gardens of AOL or Compuserve. By simply writing the code that would make your ideas tangible, there were no limits to innovation. Anyone, anywhere around the world, could throw up a website based simply on an idea.But today, it’s far from straightforward. As the years passed, many avoided the hard work of learning to code by simply signing up for ‘free’ services created by others. For example, Gmail was launched over 15 years ago. But is the world now changing?How many people would have moved to Gmail if they’d been fully aware that in doing so they permitting a large company to access their emails to improve their commercial advertising model?Coding brings superpowers….and responsibilitiesSoftware is a superpower. The advent of coding brought very different characteristics to the standard products that came before the computer age. Code scales immensely quickly and for very little cost. That brings with it implications. First, it’s essential that the more foundational the software is to others, the more important it is that such code is ‘locked open’ and freely accessible. Partly to allow simpler maintenance and auditing. But also to minimise the inequalities that are inevitable if a small group of individuals gain control of the floor upon which everyone else builds.And second, people need freedom to build on top of base levels because the world is a vast and diverse place. The belief that technology that will service every niche of global society can be designed and implemented by one particular company, social class or even geographic background who all share a specific world view is not only arrogant, but dangerous.Society advances by experimentationFreedom is a broad concept. It means many things to different people. But one thing that’s very clear (albeit slightly counterintuitive) is because with freedom, people make mistakes. Building a world in which people are scared to fail is dangerous — because successful innovation is as much about the many failed attempts as the few that are successful. Society advances by experimentation. So whilst the permissionless landscape may appear at times to be wild and chaotic, with many failures, the general direction of travel is clear: defend the freedom to innovate, the likely range of beneficial outcomes grows significantly.Yet where are we today?Over the past decade or so, we’ve all watched the companies that own the ramps that lead on and off networks accrue unheard-of wealth and power. And with the growth in importance of such platforms, these gatekeepers set the rules for everyone else. Rules that are often governed by commercial targets that conflict with most people’s visions of a fair and peaceful society. When dealing with vast quantities of users’ personal data in the digital world, you can pretty much guarantee that such rules will translate — at the very least — to an attack on your privacy.We don’t think that this can ever be the way forward.Permissionless innovation and software development is crucialAt MaidSafe, we’re building a permissionless network. So what does that mean?We believe developers should be able to pick up their tools and build, and content developers should be able to publish their work, without asking permission of network gatekeepers.We believe that the best innovation comes from allowing anyone to contribute.And we don’t believe in the opportunities for progress being restricted only to a credentialled minority of the global population. Anyone should have the potential to build upon the discoveries of those who came before them in the pursuit of knowledge that may benefit others in the world.So let’s remove the barriers. Let’s build networks that are open, as far as possible. Give people around the world the opportunity to build, to innovate — and yes, to fail — but also, crucially, to succeed. The principles of open source software are the building blocks for permissionless innovation. The SAFE Network is a permissionless infrastructure that lets anyone who believes in Privacy, Security and Freedom create a future in which these individual rights can no longer be ignored.With SAFE, there are no gatekeepers. No permission that needs to be asked for — and none required. Because we believe that only by taking this approach do we as a society have a real chance of solving the many problems that we face. Together.Open up the doors and you’ll be amazed where the answers come from.Removing the Gatekeepers: The Promise of a Permissionless Network was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 08. 07

The SAFE Network July Round Up

July — it’s been one hell of a month. With new releases and tasks getting the big green tick on the project plan, our team have been working and delivering non-stop. And there is no sign of us slowing down anytime soon. This month, we’ve taken the opportunity to restructure this monthly summary to better reflect the weekly updates, as well as grouping together projects that are either in-flight, or completed. As ever, we’d love to know what you think! This is, of course, only an overview of all the work in July, check out the weekly dev updates on our forum for the full picture.ReleasesThe big news this month was the release of the first SAFE Mobile Browser! A superhuman effort by the developers in Chennai, and of course all the effort by the team supporting the testing, bug fixing and QA. The only way to see how good this is is to download it yourself, whether you are an Android or iOS user, and why not have a wee read about the future plans for the browser here.We also released another version of the Desktop Browser, which took care of a few pesky bugs. You can download the latest release, v0.14.1, from here.CompletedThe Reliable Message Delivery project is now complete! The only outstanding issue has been moved to Secure Message Delivery project as it concerned signature gathering so made more sense sitting within that scope. This is important as this is the method for relaying messages in the network. Read more here.The milestone for having files containers supported by the CLI has now been fully implemented. This means you now can now create (published) FilesContainers by uploading files and entire folders with the safe files put command. You can also retrieve and render the content of FilesContainers and files (published ImmutableData) using XOR-URLs with the safe CAT command. And, you can update an already created FilesContainer by sync-ing it up with local changes made to files and folders with the safe files sync command. Go and see how easy it’ll be to upload data on the Network from the command line by trying it out yourself! Details on GitHub.In progressVaults are well underway, with many of the major facets of the initial implementation completed or close to completion. There are a few outstanding small tasks which, although small, will help lay the ground for upcoming phases. The next step is to see the results of running the SAFE Client Libs test suite against a new Vault. We’re expecting to see a few failures here, but these will enable our dev team to understand where the issues are before putting fixes in place.The implementation of the new data types in SAFE Client Libs is getting closer to completion. Work this month has focussed on replacing the internals of SAFE Authenticator to use only the new data types (including the new login packet type and changed account flow).A new project was set up in team SAFE CLI, as they work on implementing a Name Resolution System (NRS), which is the system that enables human-friendly URLs. Just like URLs on the Clearnet today, they are (normally) clear and easy to understand, and importantly remember, and we want to make sure that this is the same on the SAFE Network.This month we took the time to elaborate on the Front End themes in more detail. Each milestone; Perpetual Web, Take Control of Your Data, Private Communications and the New Digital Economy has its own standalone Medium post where we explore why each of these four things is so important, and why we’re incorporating them into the SAFE Network. In parallel, work has been progressing at pace with the design of the Perpetual Web. You can catch a sneak peek here.EventsWe had a meet up this month in Glasgow, which included a presentation by MaidSafe Engineer Jean, that led to some really interesting discussions about Vaults and how SAFE will shift our relationship with data. We’re working on the date for the next one so keep your eyes peeled!Next month already looks busy with the team at the Turing Festival, Edinburgh, Web3 in Berlin and a meet up in Brighton. The information for all these events is over on our events page so go and check out what’s happening near you.That’s a wrap for this month, but make sure you keep up to date weekly via the SAFE Network forum.The SAFE Network July Round Up was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 08. 01

A Spotlight on: The New Dig...

Photo by Greg Rakozy on UnsplashWe’ve explored the Perpetual Web, Private Communications, Take Control of Your Data and now, the final one in the series, the New Digital Economy.This is an exciting chapter for us, as a key part of the architecture of the SAFE Network. SAFE needs data to operate and data cannot be maintained without incentivising resource providers (known as Farmers). This incentive is Safecoin. You can see how Safecoin works on a technical level by checking out the latest iteration of the RFC which details out the build beautifully. But today, we’d like to discuss another core aspect of the New Digital Economy within the Network: making sure that you no longer pay for your digital life with personal data.The world of surveillance capitalismThe term ‘surveillance capitalism’, coined by Shoshana Zuboff, is an economic logic that has taken advantage of the prosumer of Web 2.0. This logic monetises human experiences. Every single action you take online, every step you track with your FitBit and each song you play on Spotify is greedily consumed and commercialised by the system. Our online lives are reduced to a raw material — the oil of the digital era. But there is a clear alternative for those who believe paying with personal data and accepting tracking and surveillance by Silicon Valley behemoths is no longer acceptable.Paying your way with SafecoinSafecoin is a cryptocurrency like no other (if we do say so ourselves). There’s no limit to the number of transactions which can take place and those transactions happen instantly and simultaneously. Unlike other forms of digital cash, they don’t rely on a blockchain so there’s no public ledger. Only the current and previous owner of each coin are known to each other so you can be paid in private. With the announcement of Facebook’s Libra project, privacy-centric coins are becoming ever more important for those who believe as we do that financial privacy is a fundamental human right, with money acting as a token to enable freedom of speech.Anonymity is often missing in crypto payments. Take Bitcoin. It’s one of the least anonymous digital payment methods available today. There are many different privacy-focused alternatives that seek to fill that demand (for example ZCash and Monero). And the game moves on further with the introduction of Safecoin.On a more practical level, Safecoin will be super-easy to use. If you can send someone a payment today via PayPal, then you’ll be more than ok to send a payment via Safecoin. This simplicity is often missing in cryptocurrencies, which means a user needs a certain level of technical literacy to get involved. We want to make sure that inclusiveness runs through the veins of this new economy.Opening up the (economic) worldFor those who provide resources to the Network — bandwidth, storage, online time — the rewards will be digital and accessible. Through this, they earn Safecoin, which can then be used to buy Network resources — like the one-time fee for uploading data to be stored permanently — or exchanged for goods and services like any other currency.No pleading with a bank to let you open an account. Or waiting for an institution to deem your local economy worthy of the expenditure involved in building a branch. Just set up online and join the Network from anywhere around the world that you have a connection to the Internet.This won’t be the last you hear of the New Digital Economy. No, we’re only at the beginning of exploring the value this will unlock, not just economically but socially and politically too. Your personal data will become valuable — because you will always decide who will have access to it and be paid accordingly.You are no longer the product. You are the Network. And now, the choice is yours.Interested in finding out more about the SAFE Network? Join the forum today to be the first to hear news, updates and releases, as well as be part of a community that's committed to changing the world.A Spotlight on: The New Digital Economy was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 07. 30

Release: SAFE Mobile Browser

Photo by Rodion Kutsaev on Unsplash‘One small step for man, one giant leap for mankind’.It’s been 50 years since Neil Armstrong uttered those infamous words when he landed on the moon with Buzz Aldrin. And by gosh, haven’t we seen a blaze of technical achievements since then. Well, we’re delighted to announce our very own Eagle lunar — the very first SAFE mobile browser has landed!Until today, browsing websites on the SAFE Network was only possible through the desktop browser, which of course isn’t the only way we access the internet. We use mobile for most of our internet browsing with data showing that approximately 72% of adults claim their phone is the most important device for accessing the web. And this shouldn’t be any different on the SAFE Network. There are 5.11 billion unique mobile users in the world today, which is up 100 million, or 2%, in the past year alone. As the population expands, this number will only continue to grow as the developing world often take a mobile-first approach due to their lack of legacy infrastructure. And making the internet accessible to all is one of our core missions.So what are we releasing?While it’s a card in the Task Project Board, we haven’t really given much away as yet. This is the first of many releases, with the plan to implement basic setup and release the initial version, then start working on various iterative versions. This version however, is more like a POC as it lets you see some functionality. For example, it enables you to fetch static websites from the SAFE Network all from the ease of your mobile phone. It also allows you to bookmark your most visited or most favourite SAFE sites.How do I try this out?We hope you’re as excited as us to download the mobile browser and give it a test drive yourself. All the details can be found over on the forum, including compatible devices, installation instructions, handy visuals to show you how to browse the network as well as a full suite of FAQs. And as an open-source project, we’re excited to accept contributions to the code from outside of MaidSafe and we aim to make that as easy, and clean, as possible. Details of how to contribute are all over on GitHub, or if you prefer, just add any feedback to the forum and our team will pick it up.So what’s next?We’ve got a plan in place for the upcoming versions as we’re looking to add more standard browser features such as multi tabbing, browsing history and themes. With the advent of the Perpetual Web, it’s not far from our reach to be able to view the version history of your favourite site. So, once we have basic browser features implemented, our next step will be to support Perpetual Web features on the mobile browser.With the upcoming changes in the APIs to support new data types and other features, we are also looking into better integration between .NET and JS API so that we can support web app authentication and data operations in web apps developed using our JS package.We’re full steam ahead on the lead up to Beta with no signs of slowing down. The mobile browser is just one tool that enables the SAFE Network to be placed, not in the hands of big money corporations, or feed hungry surveillance capitalists, but who the internet was originally intended for — you.Release: SAFE Mobile Browser was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 07. 24

A Spotlight on: Private Com...

Photo by Marko Pekić on UnsplashHaving already covered the Perpetual Web and Take Control of Your Data, we continue our ‘A Spotlight On’ series with our next topic, Private Communications.It is one of the most discussed network features by our community, and with good reason. Communication is fundamental to life. It lets us grow and nurture relationships with family, friends and colleagues, with whom we can share our experiences and achievements. It’s woven into the fabric of society and drives our development, not only as individuals, but also as human beings.But for communication to be truly effective it is not enough for it to simply be possible. We must be able to communicate in our own way, under our own terms, with complete confidence that our views are not shared with anyone other than the intended recipient. Anyone that’s had a deeply personal conversation in a quiet public place will understand. In short, it is imperative that we are able to communicate privately.Why does privacy matter?Privacy is a complex topic. It is both polarising and nuanced, and is often greatly misrepresented in the media who inevitably try to oversimplify. They suggest there are only two types of people in the world: good and bad. The bad seek privacy as they are up to no good, using the web for nefarious purposes. The good, on the other hand, have no need for privacy, a view that was infamously echoed by then Google CEO Eric Schmidt, who stated:“If you’re doing something that you don’t want other people to know, maybe you shouldn’t be doing it in the first place.”We can take this view with a pinch of salt when we consider that Google’s business model was, and still is, based on invading the privacy of hundreds of millions of users on a daily basis! Furthermore, we suspect even Eric Schmidt uses passwords on his email and social media accounts, sends direct messages and perhaps even has locks on his bathroom doors…So, despite what you might hear, privacy is not about good and bad. Human beings are social animals, and while sharing is part of who we are, it is equally fundamental that we are able to express ourselves free from the judgement of others, and this is really what privacy is about. We should also not forget that privacy is a human right and is written into all of the major international and regional human rights declarations, including the United Nations Declaration of Human Rights (UDHR) 1948, Article 12, which states:“No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.”Freedom of expressionHowever, many world governments choose to overlook these rights in order to further their own cause. According to Freedom House, an independent watchdog, freedom of expression (defined as: ‘assaults on the press and encroachments on the speech rights of its citizens’) has reduced each and every year for the past 13 years. Controlling the media is a well-used and understood tool for maintaining control over the general populace. In some regions, such as China, Egypt and Saudi Arabia, the imprisonment of journalists has become an increasingly common tactic to manage what is written about their regimes. Unfortunately, this issue is becoming increasingly widespread as press freedom scores fell in four out of six regions in the world.And it is not just press freedoms that are faltering, personal freedoms are too. In Turkey, the autocratic government had more the 20,000 investigations running in 2017 alone, with 6,000 prosecutions of citizens that were deemed to be ‘insulting the president’.Enabling citizens and press to express themselves freely is an essential part of any progressive society. The actions of leaders should not go unquestioned, and the people in power must be held to account to ensure that they are working for the interests of the citizens they serve Private communications provides a platform for the free flow of information, potentially protecting the identity of the citizens if need be to enable them to express their beliefs without fear of reprisals.Where does the SAFE Network come in?SAFE can’t fix many of the political wrongdoing taking place in the world today, but it can provide a safe haven for those who rightly stand up and question the world around them. Private communication is a weapon against injustice, and those familiar with the SAFE Network will know that it has been designed and built from the ground up to ensure that all communications are private, uncensorable and free from surveillance.Join the fight today!A Spotlight on: Private Communications was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 07. 23

A Spotlight on: Take Contro...

Photo by Yuri Bodrikhin on UnsplashFollowing on from the overview of the SAFE UX/UI roadmap, and our implementation approach, we are taking a more in-depth look at each of the roadmap milestones. As you may recall, our first post in this series focused on the Perpetual Web. Now it’s time to elaborate on what we mean by “Take Control of Your Data.”What do we mean by taking control?In the current Internet (the ‘Clearnet’), you lose control of your data as soon as you upload it into the silos of the large technology corporations (FAANG et al). You see, these companies have complete autonomy over who can access their platforms, and can choose to remove this access at any time. For example, in 2016, Twitter deleted the account of their CEO Jack Dorsey who lost 700,000 followers in the process citing an ‘internal mistake’. Around the same time, Facebook deleted posts addressing fake news by their CEO Mark Zuckerberg in error.While the irony of these incidents can be amusing, they do expose serious issues. Each one highlights that we are afforded access to our accounts and data according to the whims and business decisions of our service providers. In other words, we don’t really own our information in the true sense of the word. This is fundamentally wrong.Your Data, Your ControlIt’s worth highlighting early on that with this milestone, we’re talking about private data only. Public, or published, data on SAFE is perpetual and, while it can be versioned, cannot be deleted. On the other hand, the properties associated with private data gives you, the user, a range of levers to allow you to manage what you wish to do with your information.Changing the Business Model of the WebAs we touched on in the Perpetual Web post, this milestone also means that surveillance capitalism is no longer viable as a commercial model on SAFE. The incentivisation structure is more efficiently aligned because the software will have to be designed and marketed around its utility to humans — as opposed to being designed to reward advertisers as it is today.One way we’re doing this is fundamentally re-inventing the way in which apps interact with data. The architecture of applications as we know today will be revolutionised on the SAFE Network. It’ll no longer be this distant third party that you unknowingly hand over all your data to, with your only defence being in the form of lengthy, unreadable, terms and conditions in which they obliquely promise not to leak, sell, lose, or deny you access to your data in the future. The absurdity of T&Cs has been appropriated into memes, jokes and even a comic book. In this world, your data will be liberated. It will be yours in the truest sense of the word: portable and shared with whomever you choose.Truly Portable DataThe essence of data portability is an aspiration for the developers of Web3.0, it’s a buzz word for the likes of Facebook and Google, it’s even mentioned in GDPR.With the SAFE Network, portability becomes a reality from the very architecture of the system. All of your private data stays under your charge and is never in the hands of others. This gives you very detailed control of precisely who you share your data with, including the ability to limited access to your private data whenever you like.We believe that giving back control to users will be a pivotal point in the evolution of the Internet and the relationship we have with our private data. While Perpetual Web refers to the public (published) data, our private data will no longer will it be held captive in the silos of the large tech companies.Making this a realityThis isn’t just head in the clouds thinking. We have a number of live projects underway that are making this a reality. The best way to keep up to speed on progress is to head over to the GitHub project board or check-in every Thursday for the weekly updates over on the forum.The SAFE Network is the Internet of tomorrow in more ways that one. Taking control of your data is a real possibility, with some real tangible progress being built today. The world that we live in now, where data is owned and managed by third parties, will soon become a thing of the past. And we won’t stop until that day comes.A Spotlight on: Take Control of Your Data was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 07. 12

A Spotlight on: The Perpetu...

Photo by Nadine Shaabana on UnsplashYou know we’ve got lofty ambitions with the SAFE Network — a secure, autonomous network that puts privacy at the heart of its users. And if you are following the weekly updates over on the forum, you’ll see we’re steaming towards Beta at pace. But how are we designing this new Internet? You can see the Front End Roadmap has four concepts, or milestones if you will: Perpetual Web, Private Communications, Take Control of Your Data and the New Digital Economy.Let’s start with the first of thoseWhat is the Perpetual Web?If you’ve seen the SAFE Network Fundamentals, the concept might be familiar from #8;All public/published data on the Network will be immutable and available on the Network in perpetuity. In exactly the same way as the Internet Archive stores versions of websites that were published with mistakes, it will be impossible to delete any data from the Network after it has been uploaded. That does not mean that you won’t be able to change data — you will be able to make append-only changes, i.e. historic, earlier versions of data will always remain stored on the Network (whether they are accessible or not).And check out this rather vintage video of ours from 2007 (😱) which shows just how long we’ve been focusing on the Perpetual Web. why has this notion of perpetuity been our target for so long?You might have heard our Front End team explain storing public data forever on the SAFE Network as “the Internet Archive on Steroids, baked into the web by default”. If you’ve not heard of the Internet Archive, it’s a non-profit organisation that is building a digital library of Internet sites and other cultural artifacts in digital form. They’re doing important work because the Web today is actually quite a fragile place. Much of the early web has now been lost. Even the Web’s very first page is now only accessible via a copy. And this is a problem that could get much worse. Our most valued memories — in the shape of photos and videos — are increasingly stored on centralised systems like Facebook which could be lost when (not if) Facebook closes its doors.It happened with Myspace. It’ll happen again.Initiatives like the Internet Archive are valiantly trying to protect our data. But they are facing a challenge on an unprecedented scale. Every single day, millions of photos, videos and stories are being added to the web. It’s actually more than millions. Data from 2018 estimated that its about 2.5 quintillion bytes of data each and every single day. How can we possibly capture and store such vast amounts of information in such a dynamic environment?This is where we step in. The SAFE Network makes public data perpetual — which means that you will no longer have to manually archive each page. The result? You can keep your memories forever. And this comes with all the other benefits of the SAFE Network: it’s not run by a single organisation, it’s available cross-borders, decentralised and can’t be censored…the list is endless.How the Perpetual Web benefits us allSo apart from posterity, why is the Perpetual Web so important?Public data that is always accessible and permanent helps to defeat censorship. If we want to avoid a selective view of the world, people need to be able to access a log of all stories that are written. It’s always been a truism that history is always written by the winners. From the early advent of the Web, we’ve had the potential to ensure that governments and institutions don’t simply cherry-picking the stories that they want to publicise. The Perpetual Web prevents the rewriting of history, which can have catastrophic effects, even worse than some of the human rights horrors we’re witnessing in some countries now. We want an authentic Network. One of honesty that doesn’t hide or blinker the truth.We think you do too…Widespread collaboration reaps rewardsOpen source is in our DNA. And this permissionless approach to collaboration extends way past simply software development. The Open Science movement is a call to arms to make scientific research (like publications, data, physical samples and software) accessible to all levels of an inquiring society. Inclusive of whether you are a curious amateur or a professional researcher.Academic journals have their origins in the 17th century where a societal demand to access to scientific knowledge prompted groups of scientists to share resources. In the same way today, surely anyone around the world should have the opportunity to tackle research questions? Assuming that innovation is created solely by specialist credentialed academics within select institutions discounts thousands, perhaps millions around the globe. Serendipity provides unexpected solutions. The more people are involved, the greater the chances of a random connection providing a new approach.The Promise of the Perpetual WebAnd for those who think a Perpetual Web with everlasting data is perhaps slightly unpalatable, think about this. Do you believe as a society we should strive to restrict or share information? And do you believe that humanity needs to collaborate to progress and thrive? There are many people on this planet and the numbers will only rise. Now is the time to build the infrastructure that will harness the progress that we all need to make — together — for the benefit of us all.As we build out the Perpetual Web, we guarantee that every design decision we will ever make in our work will be centred wholly on providing a free and open Internet for all. we’ll continue telling stories about why we need such systems, and more excitingly show you what this looks like.Of course, the story is different when it comes to personal and private data. But for published (public) data the argument is clear. Whilst we’ve not reached the Perpetual Web yet, we soon will. And we hope you agree: that day can’t come soon enough.A Spotlight on: The Perpetual Web was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 07. 02

SAFE Network June Round Up

As we approach the end of June, and reflect on the amazing work that has been going on on the SAFE Network this month, we have some pretty big updates. We have seen some fantastic community events across the globe, with even more coming up as well as significant technical progress and releases across the project plan.Let’s start with a reminder of the new projects boards where you can see all the real-time progress of each milestone. These are updated regularly by the project team so you won’t ever miss an update but remember! The weekly Dev Update on the Forum gives a great overview if you are ever unsure of the technical details. And of course please always question if things aren’t clear. You’ll unlikely be the only one and it’s important that you, the community, fully know what’s going on.It has been full steam ahead across the technical teams this month. The team have been making significant progress on the SAFE CLI project. We shared for the very first time a SAFE CLI PoC which supports commands for authorisation of the CLI app against the auth_cli and all basic operations for test safecoins and wallets in general.There has also been significant progress in creating a PoC Safecoin wallet command line interface. This CLI PoC showcases how Safecoin wallets will function on the live Network, the functionality of the Safecoin API and let users see just some of the wallet possibilities.The QA team have been making strides too with Jenkins now active in Safe Client Libs. This addition to our testing suite allows the development teams to move at a greater pace, reducing the testing build time and opening up more time for future milestones. You can read more about our implementation of Jenkins here.The latest SAFE Browser is also now available. Version 0.14.0 improves internal logging, fixes a variety of bugs as well as new features like improved internal logging. Go and download and test it out for yourself!Once again the global spread of the SAFE Network was highlighted with meetups in Glasgow and the imeniant kick off in three Swedish cities. And a special thanks to Sostros for yet another great meet up in Chicago in partnership with Chicago Hod. So you always know what’s going on, we’ve also created an event page on the forum. We’ll need your help in keeping this updated though, so make sure you let us know when you’re hosting your next meetup!And we were delighted to catch up with some community new and old at the Scottish Blockchain meetup featuring Andreas Antonopolous in Edinburgh. Not only was his key note speech inspiring and thought provoking but it was it wonderful to catch up with so many enthusiastic supporters.You have another opportunity to meet some of the MaidSafe team in a SAFE Buzz with Ravi. Ceilidh and Ravi discuss his role in the SAFE Client Lib team, his day to day work and the projects he is working on.One of the biggest updates we’re excited about it the Front-End releasing the UX Roadmap as well as the plan on how to get us there. These two Medium posts outline the design team’s approach to designing and explain how we’re going to change the world by putting this wonderful system in your hands. We’d love to know what you think so please join us in the forum and give your two cents.SAFE Network June Round Up was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 07. 02

#SAFEtheInternet (27 June 2...

Photo by Niv Singer on UnsplashWelcome back to a new series where we explore some of the most important stories from across the fields of privacy, cybersecurity, surveillance and general internet goings-ons. Think that we’ve missed out on some bigger stories? If so, let us know what your top picks would be on the ‘What’s up today’ thread in the forum or @ us on Twitter. This week, we’ve focused on acts of surveillance by the state and corporations.One:Anyone who orders stuff online knows how annoying it can be to have to wait in for deliveries, or even worse, miss them completely. So, Amazon and Walmart in the USA have come up with an interesting idea. You can let the person delivering your order your house to drop off your order and for your peace of mind, the Amazon employee will be fitted with a bodycam so you can ‘check’ up on them.There’s a couple of troubling layers to this. First, you’re allowing Amazon and Walmart into your house. Into your actual home. Secondly, this is being recorded by Amazon and Walmart — so you don’t own that footage of them in your hallway. They do. Another dimension to this that the delivery driver becomes a walking surveillance camera while also being tracked by their employer. So we end up in an Inception-equse world where the watchers are watching the watchers who are watching the watchers… again, with another story of them attempting world domination through surveillance.Instead of static CCTV cameras outside your home keeping an eye on your property, Amazon have patented an idea to let drones watch your home for any criminal behaviour. They’ve hinted that customers could pay for this service on an hourly, daily, or weekly basis. And that the drones could also be fitted with microphones.Now, we all know Amazon is very, very concerned about our privacy (can you sense our sarcasm there?!) so they’ve included geo-fencing technology in the design to make sure the drones don’t capture footage of houses they’re not supposed to.We don’t see this ending well at all. 2018, the A.I. video analytics market was estimated to already be worth more than $3.2 billion, a value that’s projected to balloon to more than $8.5 billion in the next four years, according to research firm Markets and Markets. This industry has grown out the proliferation of CCTV footage which is too much for humans to handle. For example, Edinburgh has approximately 208 public CCTV cameras and no doubtmost likely many more private companies, each of which will be producing thousands and thousands of hours of data. By introducing AI makes this data, this becomes manageable — but at. At what cost? however. Studies t Time and time again, studies have shown AI technology is inherently biased — and in many cases discriminatory.Can we really trust more tech to solve this problem? the same track, Sidewalk Labs, part of the Google Alphabet conglomerate, recently released plans for its next smart city, Toronto. Like other smart cities, itn will be a place where sensors stud the landscape, tracking everything from which street furniture residents use to how quickly they cross the street. And like other smart cities, it’s still entirely unclear what that data will ultimately be used for. to finish on a slightly lighter note, a new Robocop has been seen patrolling parks in Southern California. Its naive design is concealing something much more sinister though which is constant surveillance and a normalisation of such intrusive behaviours by the police.…Want more? Head over to Twitter where we cover a much broader range of topics and stories plus updates on the SAFE Network every week.#SAFEtheInternet (27 June 2019) was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 06. 28

Designing the New Internet:...

How do we move toward the User Experience we require for launch of the SAFE Network, while working on current Beta goals?There are many layers in the stack that makes up the way a user experiences a product and interacts with a computer to achieve their goals. From the needs of the user, to the underlying architecture of the system, to the functional interaction with that system, to the interface design that enables it, to the visual design that encapsulates it. The design of each of these layers help inform one another, so cannot be developed in isolation. User experience design is neither just pixel pushing, nor a thought experiment.How do we move toward the User Experience (UX) I talked about yesterday, while working on current Beta goals? Perhaps we need to look a little past launch too, in order to set our trajectory correctly.We have got a lot of tricky UX problems to solve, solutions to explore, models to refine.How do we ensure that launch software is mature, and more specifically, we have a mature UX for launch?We can only get there by making things, testing, learning and refining. There is no other way to test hypotheses, other than building ideas and putting them in the hands of humans.There are different ways that we can get there, which each carry varying levels of risk.This is one way…Which we could do. We could focus purely on the complete network, the full launch picture, store up a lot of this work for when all the network’s moving parts are ready, do a larger body of research later on, or just make some big guesses, and we might even guess right first time. But it’s risky.So, here’s another approach, and the one we are proposing:We peel off features-sets, adopt a more lean, iterative approach. Testing more often, sharing designs, our thinking, and our prototypes to the community more often, and then increasing the fidelity of the product as we go.It’s about designing in a way that informs and supports the needs of the network design, yet wrapping them in an overall process that incrementally improves the user experience all the way to launch.How do we do that? Well in large part it’s down to designing for the system as a whole, and considering it as an entire Ecosystem.Ecosystem ThinkingThinking about, and building for, the SAFE Network as an Ecosystem that a user inhabits, allows us to set our trajectory correctly.Let me explain a little bit more what I mean:On the one hand, maybe we’re just making some infrastructure that other people will use. It’s a layer that other people’s apps and experiences will leverage, and the end user may be completely unaware.But at the other other extreme, we’re working toward that something you could quite reasonably create an entire OS on top of.It’s somewhere in the middle of these two that we find ourselves; and where our users will find themselves too. The Ecosystem.If we are cognisant of the Network Fundamentals (in particular things like: #10 using any machine but leaving no trace; and #6 Catering for multiple identities) and keep on reminding ourselves of the complete vision for SAFE, then I think it will help us dial in our trajectory correctly.The way users will use and live with the SAFE Network will come in a variety of forms; from apps that just leverage the infrastructure, to tightly coupled utilities like the Authenticator, or intrinsic features like Safecoin. There are also aspects that people may perceive like a mini OS within an OS.So this is what I mean by thinking in terms of creating an ecosystem: Something that users can understand and become familiar with across a range of platforms, and across a range of apps with varying levels of exposure to the underpinnings of the network.And most of all it needs to feel trustworthy across all these touch-points.Trust isn’t just about users having faith in the principles or motives of the project, or the fact it’s open source, or has been security audited.As a user I need to know what to expect when I perform certain actions, I know where to find things, I feel in control. Feeling out of control, or not knowing what to expect, where I am or how to find things, is a very quick way to erode trust in a system as whole.What Next?Tackling the User Experience design for the SAFE Network, with the whole ecosystem in mind, will require building out frontend features in parallel with the underlying network as two streams. So we’ll often be working on interactive prototypes, then prototypes coded on top of a mock network, then finally bolting each of these feature sets down on a live network.This transient SAFE Network application, will help you get all the test apps we’ll be evaluating, and will evolve over time to support the ecosystem.As the first step on this journey to building out the ecosystem ready for launch, we’ve been developing a small transient application, which will start as a launchpad, or download manager, for our suite of applications.This will become a test bench for these feature sets — pushing out a variety of applications to the community, while we design and evaluate them — and over time it will become a way of decoupling the authenticator from the browser, and allowing many of the functions of the system to become more portable. Like an OS within an OS, or a start button for the Network, coming in and out of view when needed.Shown above is an an early concept drawing of the SAFE Network transient app; part of the creative process that helps us set the direction of travel for the Ecosystem UX.This SAFE Network app will be evolved over numerous design iterations as we design core UX components of the Network; either as discrete apps, portable components, or tightly coupled ecosystem tools.You’ll also see, over the coming weeks, us sharing new designs and prototypes for a Perpetual Web update to the browser, enabling all of the version history and Linked Data goodness we’re getting so amped about.It’s a monumentally exciting time for the project, and thrilling to be able to get these features rolling out.So stay dialled to Github, and subbed to the forum. It’s all about to become very real.Designing the New Internet: How We’ll Get There was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 06. 27

Designing the New Internet:...

We’re at that magical phase in the project where the graft of computer science, research, and engineering, begins to turn its face toward the end user. We have the joy of putting these tools into the hands of people.As you may have seen from the latest updates, the development team are making blistering progress towards not just a Beta Network, but bouncing on to the launch of the SAFE Network proper.This is a mega-project. There are so many facets to it, from the technical intricacies, to the philosophical, and to sociological impacts. It can be hard sometimes to grasp the ramifications of SAFE, and the ways in which it has the potential to change the face of the Internet as we know it. So when we’re considering how to design and build-out the core user interfaces to the platform — we’ve kept this in mind.If you’ve dug into the detail of the the Roadmap you’ll notice some User Experience milestones. We’re breaking down this frontend work into discrete understandable chunks, each of which will showcase a different feature-set of the Network as a whole.I’m going to unpack what each of these milestones will mean, how they’ll combine together to complete the core UX for launch, and then how we are going to get there.The Perpetual WebThis is our first feature set, and one that as been referred to as “the Internet Archive on Steroids, baked into the web by default”. It’s a reasonable summary pitch if you bumped in to Brewster Kahle between floors, but it’s actually way more than that.Not only does the Perpetual Web grant the data you choose to make public an immutable, uncensorable, permanent home in the worlds digital history — giving each published site its own version history to be explored — it also brings with it the beauty of the serverless Internet. Just how easy can we make web publishing? Well, just you wait and see. But put it this way, if you can open a web browser and choose an address, you’ll be fine.Not only that, but the Perpetual Web will start to reveal what the future of the web will look like with Linked Data. What does it mean when information is no longer siloed to apps or services or domains, but when it’s free to span the entire network? When I can have a single identity and reuse that everywhere; or as many as I want; or when I can verify sources across multiple news outlets and have them all referenced in a single timeline?This will be a network of honesty, and a network of truth. And, lordy, it will be unstoppable.Much of the work we’ll be doing here will be centred on the Browser, as you might expect — especially then we’re focused in on the read-only view of things, no account necessary.But naturally this will also touch on Safecoin wallets, and as we’re enabling web authoring, a data management tool. These will be built on top of the SAFE CLI (a powerful software tool that will interface with the network) and will enable the creation, uploading and management of web data in the context most useful to the user depending on their goals. So don’t simply think of these as single standalone applications, but portable elements of the UX with in reach of the user when they need them.Private CommunicationsThis feature set is one of the most hotly requested, and readily apparent use-cases for the SAFE Network. Secure, private, unsnoopable messaging, with no reliance on centralised service providers. In itself this will be a game changer for people seeking truly private space to communicate, collaborate and create.Even just a straight alternative to Signal, WhatsApp, or humble email would be killer. But let’s stretch our expectation just a little shall we? Here’s where designing a network, rather than just an app, comes to the fore; yet again thanks to the secret sauce that is Linked Data.So, not only will users be provided with the tools to create and communicate with multiple identities (be they real, pseudonymous or anonymous), but we will be able to create global contacts management tools on the other end which will always be up-to-date.And again, joy-upon-joy, we get this whole thing network-wide, with conversations started in a channel desired by the sender, and with a context appropriate for the recipient.Oh how people will cherish portable data when they can use it, even more so when the penny drops that they don’t have to move the data, the data moves around them to fit their needs.And for some Extra Bonus Points: These comms tools will be readily pluggable in to any app, so I think you devs are gonna have a good time. Users can choose an interface that suits them, and developers can get creative and live their best lives: inventing new wheels, not repackaging the same old ones.So, again, as you might expect, we’ll be creating tools for messaging that should be readily familiar (send button, speech bubbles and address books you say?), but how and where these elements fit together within the wider context of the network is the really exciting part.Take Control of Your DataWhen it comes to private data, the SAFE Network promises big. So big in fact, that it’s hard to visualise what it might be like to be put back in control of your personal data. It starts to break down the mental models that have become so ingrained for users over the past decade or two.It means that we are fundamentally re-inventing how web-apps interact with our data and our relationship with them. It’s a bit like going back to the pre-internet days, where all of your data would reside on your home computer hard disc. In those days, you simply installed software on that PC that enabled you to create, edit and and manipulate your own data, in any way you chose. The air-gapped machine sat happily on your desk, safely containing your ‘personal data’, before that phrase even needed to be coined.What SAFE enables is very similar, but instead of a PC hard drive, I have my own little slice of a network, accessible from anywhere in the world, to me alone. ‘Apps’ are no longer 3rd parties to which you ‘sign-up’ and hand all your data to, with a pinky promise that they’ll not leak, sell, lose, or deny you access in the future.No. ‘Apps’ are now software that you use to manipulate your own data, for your eyes alone. Should you want to send that data elsewhere, or share it with a friend? Well, that’s up to you, and you should have the same confidence in that 2-party operation as you did in sending an email, or posting a letter back in the day.This changes the fundamental business model of the web.On SAFE, surveillance capitalism is no longer viable. A software developer is building software that can help the user manipulate his or her own data. The more useful software is to the individual, the more successful it will be. The value of an application will be on its utility to humans, not on its ability to harvest private and personal data. We’re turning that tap off.From a UX point to view, this will take a bit of work. Going back-to-the-future in mental models will no-doubt be a challenge. It’s a combination of the underlying architecture of the network, the language, and UI layers that sit atop of it that will provide the solution.Yes, users will have the ability to have fine-grained control over access to their data, but security itself is not the entire objective of SAFE. Feeling secure, and knowing freedom, are the aims here, and allowing users to realise their full potential when they are granted their sacred freedom of inner thought and private space, is the prize.You don’t get that from a series of checkboxes.So, we’ll be starting simple, testing, and progressively building on the design of the tools of data management and sharing controls, with these goals front and centre.The New Digital EconomyNo prizes for guessing that the mainstay of this milestone will be enabling the use of both Safecoin and Vaults.It means financial inclusiveness, and participation in the circular economy of the SAFE Network. With the underpinnings of a currency that will have near instant, private, and free transactions, and the power of Linked Data and SafeIDs, we’ll have the makings of truly human centred global cryptocurrency.It can, and will, be easy and elegant to use. No more grappling with complex addresses, or panicking about who-does-what-with-which-part-of-what-key(!?). If you are comfortable sending someone a payment via PayPal, or even just a WhatsApp message, then you should be more than able to manage and make use of Safecoin.We’ll be working on wallet components here that allow straightforward management of spending and transfers in the context of multiple identities and contexts.Likewise with Vaults. Not just the preserve of a data centre owner, or command-line wizard: offering up resources to the network should be with in easy reach of all client users.And on top of that, while we’ll be starting this thread of work in earlier iterations, we’ll be in a position to refine elements like the account creation process, ‘seeding’ and account from scratch via farming, or even gifting a new account to a friend from your own Safecoin balance.So that’s a brief overview of how we are breaking down, and layering up, the User Experience of the SAFE Network at launch.Stay tuned though, tomorrow I’ll be explaining how we’re going to to get there, the design approach, and what exactly you can expect over the next few weeks.Designing the New Internet: SAFE Network UX Roadmap was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 06. 26

#SAFEtheInternet (14 June2019)

#SAFEtheInternet (14 June 2019)Photo by Michael Aleo on UnsplashWelcome back to a new series where we explore some of the most important stories from across the fields of privacy, cybersecurity, surveillance and general internet goings-ons. Think that we’ve missed out on some bigger stories? If so, let us know what your top picks would be on the ‘What’s up today’ thread in the forum or @ us on Twitter.One:Censorship in China is not new news. In fact, since Xi Jinping became the General Secretary of the Communist Party of China in 2012, censorship has been “significantly stepped up”. Major sites like Facebook have been banned since July 2009 as has Google’s stack (although they did attempt to tip their toes the regime by prototyping a censorship-friendly prototype search engine called Dragonfly). But the censorship shows no sign of slowing down. A couple of days after the 30th anniversary of the deadly Tiananmen Square protests, people in China began reporting that they could not access the websites of The Intercept, The Guardian, the Washington Post, HuffPost, NBC News, the Christian Science Monitor, the Toronto Star, and Breitbart News. It seems some in the East are determined to block the West.Two:Following in China’s footsteps, Russia and Iran are championing internet fragmentation, with both countries setting up domestic internet services. However, what is important here that, at some level, the Great Firewall of China is somewhat superficial. They still rely on the existing web architecture but alter the way that traffic is managed — so back door strategies are continually evolving to get around the wall. What Russian and Iran are doing however is something much more sinister. They are hoping to reduce their country’s reliance on the World Wide Web and instead rely on an intranet that can be domestically operated, therefore in essence, separating them from the global network. And this move, just like traditional forms of censorship across mediums such as TV and newspapers, could be catastrophic for the protection of human rights of Iranian and Russia citizens.Three:Facebook is looking for ways to finally pay you for your data. Who would have thought it?! Remember earlier this year, Facebook was caught out secretly paying children (and adults) to install a VPN which essentially sucked data from your phone to see what you were doing outside the FB app? So guess what they’ve now done. They’ve released “Study by Facebook” which is…essentially what they were running with the only difference being that it’s no longer a secret. OK, so one thing has changed: it’s only now available to those over 18. Also, they have *promised* that they won’t snoop on user ID’s, passwords or any of participants’ content (including photos, videos or messages). They claim they won’t sell your information to third parties, use it to target ads or add it to the account or behaviour profiles that they keep on every user.Do you believe them? We don’t.Four:Once again MI5 are in the dock, accused of handling large amounts of the British public’s data in an ‘undoubtedly unlawful’ way. The BBC reported that various stakeholders including the Investigatory Powers Commissioner and civil rights groups have pointed out that the mass collection of data (messages, calls, browsing history, user locations) was being stored insecurely and for too long.There are too many issues to dive into here But from a high level, do we really need to collect all this data? There’s scant evidence connecting mass data collection with the successful prevention of terrorist attacks for example. World-renowned security expert Bruce Schneier says: “When you are watching everything, you are not seeing anything”. Or as the American Civil Liberties Union pointed out:“The best way to avoid breaches of sensitive personal data is not to collect and retain such data in the first place”Five:And finally, another government agency bodging things up. This time, the US Customs and Border Protection were the latest guys to be hacked. This breach included photos of travelers entering and exiting the country, including jpegs of car registration plates. This isn’t comforting when facial recognition is becoming more prevalent at many US airports and the news that visitors entering the country will have to hand over social media account names. If they can’t keep images of registration plates safe, how will they manage with even more personal and sensitive information?Want more? Head over to Twitter where we cover a much broader range of topics and stories plus updates on the SAFE Network every week.#SAFEtheInternet (14 June2019) was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 06. 14

Introducing Jenkins to the ...

In the SAFE Buzz episode with our Testing and Release Manager Stephen, (05.23) you may recall he spoke briefly about the implementation of Jenkins and the efficiencies it would bring. Currently our build and release processes make use of SaaS products like Travis CI and AppVeyor. However, as with any technological solution, it’s not always perfect. There are issues with speed, the number of concurrent builds, and there are certain barriers when building complex things in a build pipeline. So let’s talk about Jenkins.What is ‘Jenkins’?Jenkins is a leading open source automation server, widely used to enable CI and to help facilitate continuous and automated delivery. We’re going to use Jenkins to deliver an automated release process for all of our products and repositories — which gets the code into the hands of users fast. It also lets us gather feedback more quickly enabling us to make any changes almost instantly. Speed is our greatest ally when building the Network, and we’ll always grab any tool that supports this ambition with both hands. As an example: a complex task such as building and deploying everything under safe_client_libs that could take over 3 hours in Travis now takes us between 30–45 minutes in Jenkins. You can’t argue with that sort of maths!So what other potential does Jenkins unlock for us?It allows us to automate some of the ‘business as usual’ things (such as soak testing) which are essential but eat up team time. With Jenkins, now we simply open the Jenkins URL, click the soak test job, select a PR or commit for it to run against, and click to start — leaving the team free to spend time on other things.Jenkins also allows us to efficiently automate some of the steps in our current release processes across our repos. That helps rule out human error and improves reliability. And whilst it speeds up these processes, it also improves security by removing humans from the handling of keys, certificates and passwords etc.We want to be able to make use of internal hardware assets — in other words, hardware, alongside cloud services such as AWS — as part of our build pipelines. Put simply this allows the team to utilise existing idle hardware in the office plus, when demands are high, create temporary additional machines in the cloud to run jobs.We also want to use our internal hardware assets to support the creation and maintenance of resources used in our build pipelines (e.g. building a new version of a container that’s used in a build pipeline). Let’s explore this with an example. Say there was a job in Jenkins which built and deployed the latest version of one of our repo’s, e.g. SCL or Safe Browser. For that job to run successfully on either a machine in the cloud or hardware in the office, it needs very specific software pre-installed before the job can start. This software differs according to what is being built or deployed. That software will also be subject to change, for example the latest stable Rust version may update from v0.35.0 to v0.35.1. So it’s not inconceivable to imagine a situation where SCL needs to use Rust version v0.35.0 while Safe Browser should be updated to use v0.35.1.As you can see, there are a number of factors needing configured before our build and deploy process can begin, we can use Docker containers to give us pre-baked images of how each machine should look for each specific job. This removes the need to install and set up each of these software dependencies every time a new job is requested and it also wipes it all after it’s finished so it doesn’t affect the next job running on that machine. Each job has its own associated Docker Container which has a set version of Rust, and various other software. This enables any machine which runs that job to download that image to the machine, which is much quicker than installing the software from scratch. Once the machine is finished running the job, the container can simply be removed from the machine, leaving it in a vanilla state again, ready for the next job, or ready to be killed if in the cloud but no longer required. It is crucial that these Docker containers are frequently checked to ensure they have the correct versions of each item of software — this can be scheduled through Jenkins to automatically run and produce fresh, up-to-date containers.But what does this truly deliver?So it’s clear that together, these changes all save time. But the real benefit is that it lets QA/DevOps take real ownership of the build and release processes for all products. That’s what DevOps is about really: they keep the CD processes running smoothly and make stuff production ready, and devs can get on with the application code. With a team focusing here, it avoids distracting the other developers with this time-consuming work.But the biggest impact will be living true to our core values by making sure we have clear visibility of what status the repos are in across the entire business. It’s far more efficient and transparent if they are all in one place. This is typical of our open source attitude, where we believe the inclusion of everyone means faster innovation, better bug-catching and in this case, simply, everyone knowing what’s going on. This single location ( will be a space where our developers can go and run any number or type of job that has been set up in there for them, not having to go through manual set-up or worry about where it’s running and how to run it. This takes responsibility away from the developers, allowing them to concentrate on what they do best — making great products.What’s next?The plan going forward is to gradually migrate the more complex jobs for each repo, such as release processes, to Jenkins. There are also some practicalities; it would take a fair amount of heavy lifting to move all jobs over to Jenkins so we’re beginning with the complex jobs while making sure we’re focusing on supporting the immediate next steps on the road to launch.Introducing Jenkins to the SAFE Network was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 06. 06

SAFE Network May Round Up

With the passing of another month, we’ve once again taken the opportunity to review all the things that have been happening across the Safe Network ecosystem. Here’s a snapshot of what happened in May 2019…You take the High Road(map)Anyone who’s followed the project over the past few years knows the difficulties we’ve all faced when it comes down to roadmaps. Whilst the general direction of travel is crystal clear, we’ve responded to research and iterations in the technology that we’ve released as you’d hope. We tweak our direction according to the output of all research and, with such a complex and broad project, we’ve continued to forge our own path forwards.But May 2019 proved to be a key month as we have now released our development roadmap which outlines the work that remains en route to Launch. We’ve taken a variety of different approaches here: some look for an overall view, for others a more granular approach is preferable. Both should now be catered for. For the simplest view, our newly revamped website is the best place to start as it gives you a 30,000 foot view of each of the deliverables in progress. For those looking for a more in depth viewpoint we have created three GitHub project boards. There’s a task-level board that shows the most immediate tasks plus a Frontend Roadmap and Backend Roadmap. These will all be updated as we continue to move towards launch so keep an eye out.Swanky new SiteThe site has had a facelift! We’ve taken on board plenty of feedback and recommendations from across the community (thank you to everyone who’s taken the time to get involved!) with a little of our own extra enhancements, particularly around the How it Works and Get involved pages (plus theoverhaul to the Roadmap as outlined above). Let us know what you think!Stars in our midstA number of MaidSafers have been out and about speaking this month. Pierre jetted off to Ukraine to present at the IT NonStop Blockchain and Machine Learning Conference while founder David stayed a little closer to home as he gave a talk entitled “Say Goodbye to the Internet As You Know It” at the DigitalScotland 2019 Conference. The inaugural SOLID London meet up was treated to a visit from Nikita who chatted about the integration of SAFE and SOLID/RDF. As if this wasn’t enough, MaidSafe was also featured in a section on The Nine (the new nightly BBC Scotland news show) and Spandan featured in the latest SAFE Crossroads podcast chatting about QUICK-P2P.Meetup ManiaAcross the globe, SAFE community members have been creating and attending meetups to share their experiences, hear about the latest developments and learn more about the SAFE Network. This month we had successful meetups in Glasgow, Brighton and Chicago.Some QUICuic NewsYou may remember that we have recently moved from Crust to QUICuic-P2P for the SAFE Network’s networking layer. This month saw the first release of the QUIC-P2Pquic-p2p crate (v0.1.1) as well as a helpful video with Spandan to help you further understand the reason reason for the move and what it means for the future of the SAFE networking layers.Lifelong LearningLearn more about the Fundamentals that lie at the heart of the SAFE Network in the latest two-part blog series (Part 1, Part 2). These 20 Fundamentals are crucial to every decision made on the SAFE Network.Jon from our Routing team also published in the latest in the Road to Fleming forum series investigating Disjoint Sections. Addressing one of the key problems faced by decentralised projects, this topic has generated some fascinating discussions.And if you enjoy this piece from Jon you may also want to watch him summarise Sybil Attacks and how the SAFE Network defends itselfon our YouTube channel. If there are other topics you would like us to explain in this format please let us know.RFC’sThere are currently six outstanding RFCs (‘Request For Comments’) documents out in the wild looking for feedback. The proposals are as follows:RFC #0053 on XOR name-based URL’s (forum discussion)RFC #0054 on Published & Unpublished DataType (forum discussion)RFC #0055 on Unpublished ImmutableData (forum discussion)RFC #0056 on Secure Message Delivery (forum discussion)RFC #0057 on Revised Safecoin (forum discussion)RFC #0058 on Reliable Message Delivery (forum discussion)The outcomes of these will help us implement some of the key features of the Network going forward so we really appreciate your time and input.Thanks for joining us for another month in the development of the SAFE Network. As always we appreciate your feedback and input so please get in touch here or via the Forum.SAFE Network May Round Up was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 06. 05

#SAFEtheInternet (17 May 2019)

“Oversight” by Nathaniel Dahan ( to a new series where we explore some of the most important stories this week from across the fields of privacy, cybersecurity, surveillance and general internet goings-ons. Don’t agree? Let us know what your picks would be on the ‘What’s up today’ thread in the forum or @ us on Twitter.Ready? Let’s go!One:Smart cities are portrayed as the future for millions. Yet there is a conversation that isn’t yet taking place openly around the fact that technology that tracks and monitors societies are likely to prove incredibly intrusive and destructive to democracy. That’s not to discount the fact that some elements of this future world will be incredibly valuable. Take the project to monitor air pollution that’s being carried out by Copenhagen Solutions Lab in collaboration with Google.So what could possibly go wrong? Quite a lot — and one story this week explored one downside in particular. A database, hosted by Chinese tech giant Alibaba, that held information relating to two housing communities in Beijing was accessed by researcher John Wetherington using a simple web browser. The data he found was pretty much as scary as you’d expect: it showed where people went and for how long, together with a mass of facial recognition data. Slightly stranger perhaps was the fact that the database also held ‘attractive’ scores for each individual.Two:The Chinese style of state-sponsored surveillance is highly concerning to many (including us). It’s the sort of surveillance that will never respect national boundaries: the reach of technology that enables the monitoring of everyday life is now increasingly making headway in many countries. Chip Rolley, senior director of literary programs at PEN America and director of PEN World Voices Festival, wrote a piece for the Guardian exploring this very concern. Those familiar with the early days of the internet will relate to this statement, when he says:“While we once hoped the internet would deliver us freedom of expression, the ability to communicate freely across borders and even be a channel for dissenting views, we now see the very opposite is occurring.”Three:If you’re feeling smug about living many miles from the Chinese government, then it’s perhaps worth taking a look closer to home. In London, facial recognition CCTV (similar to that used in China) is now being trialled. So what happens if a passer-by doesn’t want to participate and covers his face? Well, in this case, such a desire for privacy appeared very suspicious to the police, who promptly stopped him, demanded he uncover his face for a photograph — and then followed it up with a £90 fine for disorderly conduct. The Cover and Intelligence lead at the Met has some very interesting things to say.Four:Ok let’s move to a good news story. We applaud the city of San Francisco, which has banned the use of facial recognition CCTV, becoming the first US city to do so. The concerns around the use of such surveillance techniques are too vast to cover in detail here. But we’ll just mention in passing the risks that the technology promotes discrimination against minorities, false positives and a basic disregard for privacy that has a chilling effect on normal everyday behaviours that erodes the human rights of individuals within societies. Here’s hoping other cities in the UK (such as London and Glasgow for example) and further afield follow suit.Five:And one for a laugh. Google CEO Sundar Pichai penned an opinion piece for the New York Times titled “Privacy should not be a luxury”. Bit of a change in tone from the days when the previous CEO Eric Scmidt was famously heard to predict (at the Techonomy Conference in 2010) that “true transparency and no anonymity” was the way forward for the Internet. Hmmm….Want more? Head over to Twitter where we cover a much broader range of topics and stories plus updates on the SAFE Network every week.#SAFEtheInternet (17 May 2019) was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 05. 17

Founding Fundamentals | part 2

If you missed Part 1 of the Founding Fundamentals Series, you can find that here.Fundamental #11: Scrub all Client IP addresses from Hop 1 of the overlay network (i.e on SAFE).Once a User has started to communicate directly with anyone else after connecting to the first SAFE Network node, the User’s IP address is scrubbed and untraceable. For clarity, the phrase ‘Hop 1’ here means the data transfer directly after that connection to the first SAFE Network node (not the hop that may take place from your computer to your home WiFi router, for example).Fundamental #12: The SAFE Network will only accept more Vaults when it needs them.The Network will balance supply and demand without relying on external controls (such as a committee choosing who can take part and when). Like any species or group of organisms, unbounded growth leads to its demise. The SAFE Network could be attacked by a bad actor adding millions of nodes: perhaps it closes them down suddenly or maybe it attempts to use malicious nodes in order to bring the Network to a halt. To help prevent this, the Network will only allow new nodes to join when it needs the extra resource. This slows down attackers, diluting their influence with the good actors who are also trying to join.Fundamental #13: The Network autonomously increases farming rewards when it needs more resources (i.e. Vaults) and decreases rewards when resources are plentiful.This is crucial functionality for a system that is autonomous and manages itself without the intervention of any third parties. If the Network simply accepted every Vault immediately, it would likely be targeted by a botnet attack or an attacker trying to set up an overwhelming number of malicious nodes in the early days of the Network.This is why the incentivisation mechanics are crucial: with Safecoin, the Network must be able to balance the supply of Vaults. This avoids a Network with a large number of nodes with very little data (which would then push the farming, i.e. reward, rates down).Fundamental #14: The #SAFENetwork ranks nodes over time and increase trust in higher ranked nodes.One of the ways in which the Network defends itself from attack is by choosing to permit only the most trustworthy nodes within each of the Close Groups to vote on the Network decisions. This is known as Node Ageing, when only the most trustworthy nodes with a history of following the rules and requirements of the Network are allowed to vote, which means malicious behaviour is prevented dynamically = no third parties required.Fundamental #15: The SAFE Network will never use servers.The SAFE Network will never rely on servers because they represent a weakness that would undermine the entire Network. Servers represent the opportunity for someone — or a group of people — to control everyone else on the Network.Fundamental #16: The Network will digitally sign all transactions to make sure that the transactions have been authorised in accordance with the rules of the Network.A Network that requires all transactions to have been signed digitally is one that can ensure that all transactions have been carried out according to the rules of the Network.Fundamental #17: All messages sent directly between Clients will be free on the Network. If those messages need to travel across the SAFE Network more indirectly, the Network will charge.Direct Client-to-Client messages (remember: Client just means the software that lets the User access SAFE) will be free but those that involve other parts of the Network and the Clearnet will incur a cost to enable the Network to cover the costs of that travel.Fundamental #18: The SAFE Network will never use time as a network tool (although nodes may use local durations).If SAFE used the concept of time, it would mean that Network nodes would have to connect to centralised third party servers or services in order to synchronise times — and you already know third parties don’t exist on the SAFE Network. Instead the Network is event-driven: it responds to the actions of users.This is very similar to nature where systems will respond to the events and actions that take place. An example of this on SAFE is within our consensus algorithm #PARSEC which is also not driven by time.Fundamental #19: The SAFE Network will only ever allow encrypted traffic and encrypted services.Put simply, everything, including web traffic is encrypted by default. Everything. This is non-negotiable for a Network that demands privacy for every one of its users. You can of course choose to make information public — but this has to be your choice alone. So this means you can be safe in the knowledge your data will always be secure.Fundamental #20: The Network will allow real-time upgrades in a secure manner. The Network will refuse to implement any upgrades that might break it.The Network be able to upgrade its software without disruption. It must be able to validate each suggested improvement by checking the new proposed software against the current software and accept the change only if can see that it brings improved performance. Why is this so important? Because a network is a living organism and in order to work efficiently, iterative changes have to be possible.So there we go. All 20 Fundamentals. Each decision, thought, idea and piece of code is tied to at least one Fundamental. They govern everything we do. And these principles will stay with us as we continue to build and grow the SAFE Network.You can also listen to the man himself, David Irvine, founder and CEO of Maidsafe, discuss these at length on the SAFE CrossRoads podcast hereFounding Fundamentals | part 2 was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 05. 15

Founding Fundamentals | part 1

All the way through the design and build of the SAFE Network, we’ve been guided by a core set of principles which act as the foundations of a new decentralised, autonomous internet. Here, we’ll explore them all in a little detail.We’ve got 20 fundamentals…so let’s start from the beginning.Fundamental #1: The SAFE Network will enable you to create an account and login anonymously and without intervention.So what does this mean? This means that creating a new account and logging into the Network will never require a third party. By removing this requirement, you decrease the chance of being hacked by others attacking those third parties. We truly believe that on the Network, hacking and the theft of your data should never be words that are associated with our online lives.Fundamental #2: The SAFE Network will enable you to securely and with no controlling intermediaries share information and messages.In other words, there will never be any third parties on the SAFE Network who can read or store any information that a User sends — unless that User explicitly gives his or her consent. That’s vastly different to today’s world where your data is all stored by technology companies in huge data centres, who then use that data to lock you into their platforms so that they can track your every movement in order to sell that data to advertisers. Removing those data stores removes that particular security risk.Fundamental #3: The SAFE Network allows the transfer of Safecoin to any other user free of transaction costs.This means each User of the Network can use any of their identities as a wallet address in order to be able to send and receive Safecoin. And there should be no transaction costs attributed to the simple exchange of value. Take a step back and think about it: money is simply a mathematical construct that enables the transfer of value between two individuals. Data is far more important than money and considerably more valuable. So why should transactions on the Network cost money?Fundamental #4: The Network enables users to anonymously create and share data worldwide.The Network will always ensure that the User has the ability to send transaction messages and posts with a temporary and single-use ID’s that are not linked to any known identity on the Network. This avoids the problem we see today where your personal freedom and anonymity is removed the instant that you can be identified online.All of your behaviour is being tracked by third parties which leads to you being pestered by advertising to sell you stuff you may or may not need...But more seriously, it’s crucial that the SAFE Network gives everyone the right to interact within digital worlds without revealing any personal information at all. Reveal what you choose to those that you wish. It’s a default position that’s fairer for all.Fundamental #5: The SAFE Network will let anyone browse content anonymously and free of charge.It’s essential that the new decentralised web is built without barriers to entry. One of the most important foundations for a global, collaborative platform is that anyone can access public content for free at any time without having to create an account. In today’s world, you need to prove that you are authorised before you can access data: for example, if you want to set up an iTunes account, you first have to verify your identity before you’re able to use the service, plus you have to agree to their terms of service…(all 20,000 words of it). Not so on the SAFE Network. Here, everyone can browse public data without restrictions. That means public information is accessible to all, not hidden behind barriers and wordy T&Cs. Instead, it’s free to retrieve all data and information stored on the Network.Fundamental #6: The SAFE Network allows you to associate multiple identities to your account.How is this useful? Perhaps you want to donate to charity anonymously. No problem, you can use one identity. Perhaps you want to whistleblow on your employer which could lead to severe consequences. No problem, you can use another identity. Need to use one identity only once? No problem. You can easily throw away each identity after a single use, without the fear of it being traced back to you. This is especially pertinent in regimes where censorship is rife and the cost of speaking up could be your life.Fundamental #7: The SAFE Network lets you send or receive Safecoin using any of your identities.This concept is tied into #6: true anonymity requires the ability to transact without trace using the identity that you have chosen to use.Fundamental #8: The SAFE Network must store data in perpetuity.This is a key fundamental: it will be impossible to delete any published data from the Network after it has been uploaded. Why? Because it means that it will then be impossible to rewrite history.That doesn’t mean that you won’t be able to update data (for example, with new website content). You’ll simply do this via ‘append-only’ changes, i.e. there will always be a permanent public trail of versions that show the changes that have been made. So in exactly the same way as the Internet Archive today stores versions of websites even if they were published with mistakes, all public/published data on the Network will be immutable and available on the Network in perpetuity.Fundamental #9: The SAFE Network will never require passwords to be on the Network or on the machines used by the Clients to access the Network.Let’s start by quickly defining Clients. When you’re reading about the Network, you can think of ‘Clients’ as simply meaning the software that somebody uses to access the SAFE Network.With that context, this Fundamental is all about self-authentication: the ability to sign into a decentralised autonomous network without a password leaving your computer at any point. Since it never sees your password, it can’t be hacked on the Network.This is a significant step forward: instead of a futile attempt to minimise the risk of passwords getting stolen by a bad actor in their journey from machine to Network, that risk is simply removed by cutting that step out in its entirety.Fundamental #10: The SAFE Network will allow any user on any machine to access the Network and it will leave no trace of that user on that machine.This means a User isn’t restricted to accessing the Network by using a specific device. Once logged out, there will be no evidence (other than say the fact that the Browser software has been downloaded) that shows what that User has done on the SAFE Network.Ultimately, any user should be able to pick up anyone’s internet-connected device and use his or her credentials to access the SAFE Network regardless of location around the world.That’s it for the first half of our run-through of the SAFE Network Fundamentals. You’ll find Fundamentals 11–20 in Part 2 of this article.Founding Fundamentals | part 1 was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 05. 15

SAFE Network April Monthly ...

Once again we are rounding up the best bits of this month. The sun has graced the Ayr office as we close off this month and in the spirit of a Spring clean we are trialling a new format for this post as well as this lovely new graphic so let us know what you think.Trading PlacesAs of 18th April you can now trade MaidSafeCoin (MAID) on Bitker Exchange. This Singapore based exchange will offer MAID/BTC, MAID/ETH and MAID/USDT hosting pairs. We continue to work hard to provide a large spread of options for the community and as always we value your feedback as we move forward with these exchanges.Buzzin’ for the next SAFE BuzzAre you up to date with the latest in our videos? This month Ceilidh was joined by SAFE Client Libs Team Lead Nikita as well as Developer Lionel from the Chennai office. Both walk us through their working days, some of their upcoming projects and developments — spoiler alert: there is no such thing as a typical day in the SAFE Network.Quick Update on QUIC-p2pFollowing an extensive period of research, testing and discussion the back end team have been working this month to stabilise the quic-p2p library. We’re working on improving the API and want to increase the test coverage to confirm it works as expected in different conditions and scenarios, including the malicious behaviour of clients. Also, the bootstrapping functionality remained so we are completing that as well. Keep abreast of these developments in the weekly SAFE Network Dev Updates.Authenticator AdditionsThe SAFE Authenticator CLI has been recently updated. By making SAFE account credentials readable there is no longer a need for users to type them each time the CLI is executed. This should also allow the safe_auth CLI to be easily integrated with other tools or applications.Attack of the Three Letter AcronymThe SAFE Client Libs team has started to work on implementing the XOR URL’s RFC. This will make it possible to use SAFE URL’s in RDF resources and link data stored on the Network together. Check out the RFC for full details!Daunted by DApps?While you are perusing our YouTube channel you may also see that we have uploaded some new development tutorials. The Chennai team have created these super helpful videos to walk you through the Xamarin, Node.js, .Net and Android tutorials. Get stuck in and kick start your journey creating DApps for the SAFE Network.Interview with IrvineCEO David Irvine has been speaking with FutureScot about all things SAFE Network ahead of his talk at the FutureScot annual conference in May.New Resources for NewbiesIn order to make SAFE even more accessible for people without much development experience, the team have updated the guides to contributing pages. We hope that these new sections and even more links will help all budding developers learn and in time be able to make significant input!Road to FlemingThe Routing team strikes again! There have been two additions to the Road to Fleming Forum series. The team discussed their research and approach to both Network Restarts and Network Upgrades. If you haven’t already read the full series on the SAFE Network forum, go check it out and as always, we’d love to hear your feedback.PARSEC Speed AheadExcitingly the core of the PARSEC work for SAFE Fleming is now complete! After some great work by the team, malice detection has been enabled and performance improvements have also been implemented. The Routing team have reformed into a single team and have begun work on node ageing this month.Timing out the Time OutAs well as node ageing some of the Routing team have also been concentrating on improving message relay, especially around removing the ack-timeout model. We know this sounds complicated but it basically means that the message relay system will be more effective and asynchronous.Time for a cuppa and a good readWe were lucky to have the second version of the SAFE primer released by some very talented community members this month. Not only has the text had an update and now includes PARSEC but it has also had a colour face lift to now match the vibrant branding of It is a fantastic resource and we are very thankful for the community for the hard work they continue to put into creating and maintaining it. If you are new to the SAFE Network or are looking to brush up your knowledge on a specific topic, it’s a great place to start!Ceilidh has also published a beginner’s guide to self-encryption this month which gives an overview of the unique encryption mechanism in the SAFE Network.You may have noticed that we have started a regular tweetstorm looking at key stories from across the privacy, security and technology industry. We hope that you are finding this useful. Keep an eye out for the next ones every Wednesday!Special MentionWe end this month’s round-up with a special shout out to community developer Edward @oetyng who has taken the time to provide really valuable feedback on the Routing naming conventions. The technical teams are always open to feedback and suggestions so please don’t be shy.SAFE Network April Monthly Round up was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 05. 02

Sidelining Sybil Attacks

Photo by Philipp Katzenberger on UnsplashOne of the key problems with decentralised system is their vulnerability to attacks. There is no central authority to regulate truth nor deny entry to potential bad actors.Although there are many malicious behaviours that could harm the Network, Sybil attacks may be one of the most pressing so we wanted to address it and help the community understand not only what it is, but also why the team have spent so much time creating defences.So What are Sybil Attacks?Seems odd to name a form of malicious networking behaviour with a woman’s name, but there is method in the madness as it is named after the famous 1970’s book: Sybil and subsequent film following the story of a young woman with a multiple personality disorder. This type of network attack is based on a single attacker creating multiple identities with which to flood the network in order to use these numbers to gain a disproportionately large amount of control and power.If it helps to think of it in the context of the current Internet, think of a reviews site. A bad actor sets up multiple accounts to write fake accounts for a product luring others to buy a poor quality product. In the SAFE Network this bad actor may be seeking disproportionate influence within a Section to control the consensus mechanism or attempting to double-spend Safecoin.Stop Sybil in her TracksOK so Sybil attacks sound like they could cause a lot of problems for a peer-to-peer network. So what is the best way to mitigate them? That’s the million dollar question and each decentralised system has its own solution. Many rely on consensus mechanisms such as the blockchain, which might use the Proof of Work mechanism to reduce the ability of bad actors to take control.The main reason behind Sybil Resilience is to make it disproportionately expensive to conduct attacks in order to reduce the incentive and dilute influence throughout the system.SAFE Network vs SybilThere are three main ways in which the SAFE Network is designed to combat Sybil attacks. Firstly the Network will only accept new nodes when they are needed rather than blindly adding anyone who fancies it. This means a malicious actor cannot create 1 million nodes and simultaneously add them to the Network in order to take control.Second, any node that joins the Network is subject to Balanced Relocation. This means that the node is not allowed to pick its own location but is instead allocated one by other nodes. This means that a bad actor cannot cluster their malicious nodes in one area to gain influence in that Section.Thirdly, the SAFE Network also has a mechanism called Node Ageing which is similar to a reputation system. The level of influence that a node has is directly correlated to the amount of work and positive behaviours that it has performed. A malicious node would have to spend excessively large amounts of time and resources to gain the power to influence any network event — and that power would be revoked as soon as negative behaviour was detected. Thus making it too disproportionately expensive to attempt an attack.The SAFE Network has security at its core and every design decision has been made to ensure that protection of users’ data and their privacy is paramount. This was only a very brief overview of Sybil resilience. If you would like to know more head to our Forum.Sidelining Sybil Attacks was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 05. 02

QUIC, Quinn & Crust: an update

Photo by Robin Pierre on UnsplashQuinn. quic-p2p. You may have seen these two words pop up in our weekly dev updates for the past couple of weeks, so we thought it was about time we explained to you, in some more detail, what is going on.We’ll start off with a super quick glossary.QUIC (Quick UDP Internet Connections) is a specification. QUIC is the solution to a number of transport and application layer problems. Whilst it’s very similar to TCP and TLS, it’s implemented on top of UDP.Quinn is the crate we’re adopting QUIC from.QUIC: A Brief HistorySo where did QUIC come from? While we may not agree with their surveillance capitalistic practices, QUIC originated at Google — but stay with us. It was an experimental network protocol designed by Jim Roskind who worked at Google at the time. They deployed it across Chrome, YouTube and Search as well as other services to allow them to observe the protocol in action. However, the version that Google developed is very different to how it looks today. From the wire format of the packets, to the handshake and the mapping of HTTP, QUIC grew organically thanks to open collaboration and a shared goal by many developers of making the Internet faster and more secure.How the SAFE Network Uses QUICOriginally, MaidSafe did not intend to build a network library. We developed Crust, an open-source library that enabled computers to connect to each other on a peer-to-peer network, because nothing existed with the features we needed. Never content to stand still, we looked at other libraries (such as uTP) but found that they all lacked our vision of a fully-secured networking library.We then identified that we could achieve the same objectives by using open source code based on the QUIC specifications. The Quinn crate is an open-source implementation of QUIC that has been developed in Rust (the programming language of choice for the backend of the SAFE Network). We made the decision to replace Crust with QUIC. We’ve named our library quic-p2p because we wanted the name to be self-explanatory (we’re using the QUIC protocol to code our p2p library). Plus it’s pretty catchy, don’t you think?So why have we moved from Crust to quic-p2p?Crust was built upon TCP and provided the basis for all additional protocol engineering. QUIC is different. It’s a fully-formed, single protocol so there is no requirement for any additional protocol engineering. Secondly, its ready…almost. It’s been adopted by the ITEF and whilst that standard may evolve over time, any future changes won’t affect the functionality that it already has today that we’ll be relying on. Plus our ambition is to get to full launch as speedily as possible which means we’re more than happy to utilise existing solutions; this is open development and open source at it’s best. QUIC is also fast, can setup connections cheaper than TCP and can accept hole punched (UDP) sockets. And last but not least, QUIC already has functionality that we were building into Crust. So why wouldn’t we grab the opportunity to build on work that solves our problems?So is Quin better for the SAFE Network than Crust?In a word — yes. There are three main advantages;Encryption: QUIC sits upon UDP protocol and it’s encrypted by default. Crust would previously have dealt with this by encrypting before sending anything through TCP (because TCP isn’t encrypted itself). However in the new world, QUIC has encryption with built-in TLS certificates — so encryption is free.Multi-streaming: Another issue with TCP is head-of-the-queue blocking. In other words, whatever arrives first in the queue gets delivered first. An application treats a stream of bytes sent via a TCP connection essentially as FIFO. For example, if you send 1GB of data and then 1KB data, they’ll be received sequentially, biggest first. So this means subsequent smaller data can be left sitting in the pipes, held up until that first packet is received. QUIC does things differently. On the same pipe, you can open a stream and send different data down different channels simultaneously, so there’s no head-of-the-queue blocking. In Crust, we emulated this by using our chunking algorithm and priority queues. By adopting Quinn, we no longer need these things.ITEF Approval: While QUIC is a living standard (in the sense that it is not finalised), it was adopted by the IETF in 2016. The standardisation of this provides added credibility for SAFE newcomers. While Crust was built on TCP (which of course is an IETF standard), the additions we built on top weren’t specifically addressed by the IETF. are many other benefits (such as prevention of IP spoofing, stateless retries etc.) that QUIC brings with it. Being a modern protocol, the specification has considered the shortfalls of the existing mechanisms studied over decades and addressed those issues in QUIC. And even better, we’re one of the first to actively use this protocol.So there we have it. While Crust was the right solution for us to pursue until now, we’re hungry enough to understand that if better solutions exist that let us get the Network ready for you faster, without any compromises, we should take that opportunity and grab it with both hands. The move towards fully encrypted, secured private communications built on the efforts of a global community gives us solid foundations to build the SAFE Network.QUIC, Quinn & Crust: an update was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 05. 01

The New Age of (Self) Encry...

Photo by Matt Antonioli on UnsplashData breaches happen daily around the globe and third parties either have no legal duty, or worse, just don’t care about making sure your data is securely encrypted. Here at MaidSafe, our core values are privacy and security and as a result, these principles are central in how we design and build the SAFE Network. And self-encryption is no different.First things first, what is self-encryption?It is a version of convergent encryption with an additional obfuscation step….what?!Let’s take a few steps back. If we remove the prefix ’self’ for the moment, you have encryption — a way of concealing information using a mathematical approach to obfuscate, so that only those intended to see the files can gain access. Sounds good right?This is already a common practice by cloud-based solutions such as Dropbox. They encrypt all data in transit using Secure Sockets Layer (SSL)/Transport Layer Security (TLS) between Dropbox apps and its servers. Once it reaches Dropbox servers, it is then encrypted with 256-bit AES, which is an industry recognised standard and (almost) impossible to crack without the encryption key.So you might be thinking, “surely these solutions already encrypt my data so why do I need anything else?”. However they don’t provide client-side encryption which means you, the client, encrypts the file before it leaves your computer (although with Dropbox you can add your own encryption) they, the third party, manage the encryption keys along with your data. There are a couple of issues with this. First, the way data is stored on some cloud solutions means that your files are decrypted as soon as you log in. Why is this a problem, surely this makes the user experience more seamless as you don’t need to take any extra steps? The problem arises if someone has access to your password. They can access your files — the encryption is now pointless and doesn’t offer you any protection.However, a second more sinister issue is Man in the Cloud attacks. Here, a hacker doesn’t need your passwords. They simply access your computer, steal the synchronization tokens which are provided by the company to identify you as a user, and then place them on different computers. Because these cloud solutions cannot identify if the token is being used on another machine, this will go unseen. Therefore the hacker will then not only have access to the documents but also control your entire drive. Yikes!!And last but not least, anyone who grants a third party responsibility for managing the safety and security of your data is troublesome, and we don’t need to tell you why.So we earlier mentioned that Self-encryption is a version of convergent encryption, which is also known as a content hash keying which creates identical ciphertext from an identical plaintext file. It contains some applications in cloud computing to eliminate all duplicate files from storage services, without a provider needing to have access to encryption keys.Self-encryption is something new because it has no keys. A file is encrypted using its own contents as keys for encryption. After encryption, a Data Map is generated and this Data Map is used for decryption. And why is this so important? Because crucially, it ensures that all of your private data stored on the Network is unrecognisable and only those with the correct credentials and the relevant Data Map can fetch the chunks, decrypt them and put them together. And even if an encryption algorithm is compromised, a hacker won’t be able to decipher the data. Cool huh?!Let’s Take An ExampleRight so how does this work? Things are always easier with an example, so let’s say Bob has a Word doc he’d like to store on the Network. The Network takes this file and divides this up into a minimum of three chunks; Chunk 1, Chunk 2, Chunk 3. From this, the system creates a Data Map. A Data Map lays out the pre and post encryption details and the location of each chunk to enable Bob to retrieve his files whenever he likes. And, the Data Map can be run through the self-encryption process too.So once each chunk has been hashed and documented on the Data Map it goes through the encryption process. To do this, the Network encrypts using the algorithm AES 256 encryption protocol and hashes each chunk. And this is where the additional obfuscation step comes in. So the hash of C1 is encrypted with the hash of C2, C2 is encrypted using the hash of C3 and C3 is encrypted using the hash of C1. To further obfuscate the data, every chunk is passed through an XOR function using the hashes of other chunks. So C1 would be XOR’ed with the hash of C2, and C3. And the hash of C2 would be encrypted with the XOR of C3 and C1 and…you’ve probably worked out how C3 would be encrypted. The output is then documented on the Data Map, which also can be run through the Self-encryption process. this happens on Bob’s computer so that his data is already encrypted before it hits the Network and only Bob with his Data Map can access and decrypt his file. And this happened instantaneously, with no disruption to how Bob would normally store a file.If Bob had bigger files (for example a file full of photography), this would automatically split into chunks and distributed autonomously across the decentralised network. This means larger data files are not stored in one central place, adding another level of security.So there we have it. Self — encryption, the way the SAFE Network will solve issues with existing encryption solutions, based on trusted cryptography and a way for you to truly take control of your data.If you are new to SAFE and are interested in understanding more about what we’re doing to make the world a better place, join us on the Forum.The New Age of (Self) Encryption was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 04. 09

SAFE Network March Round Up

2019 is flying past and as we enter the Scottish spring we look back at some of the key achievements of March. There has been some really exciting progress with PARSEC as well as a variety of update releases from the front end team. Each and every team has been working on some developments this month so lets get into the details.If we start off with a look at some of the technical progress that has been made this month, first up has to be the submission of the updated PARSEC whitepaper to the Journal of Parallel and Distributed Computing. This latest Whitepaper highlights the improved algorithm which is now fully asynchronous. We are excited to have made this move from highly to fully asynchronous ABFT consensus and look forward to sharing it with you all as soon as the peer review is complete.Yet again the front end team have been busy and have now released the latest versions of both the SAFE Browser (v0.12.0) and SAFE App nodejs API (v0.11.0). As well as technical updates the SAFE App includes improved documentation which we hope will help developers better understand how the package is structured and be able to get more involved in the project.Following intensive research, the front end team have also started exploring the idea of having a SAFE Authenticator CLI as we understand that GUI is not suitable for all situations and developers. The new CLI will interact directly with SAFE Client Libs with Rust and we are looking forward to hearing how your feedback.And if that wasn’t enough there has also been a release of the SAFE messages mobile app as an updated PoC. You can download the v0.1.1 APK from GitHub which will showcase how to use the MaidSafe.SafeApp NuGet to build a simple email application for mobile devices and hopefully inspire you to create a SAFE DApp of your very own.Now let’s turn our attention to the Crust team. This month there has been extensive work to code almost the entirety of Crust using QUIC from the quinn Rust crate and test this implementation to see what it brings us. The biggest benefit of this move would be the industry standard TLS which would simplify many of the processes currently needed in Crust. QUIC is basically what Crust was intended to be. Of course, we have our own parts, such as random ports, restarts, bootstrap cache, etc. but fundamentally the underlying protocol is close to perfect for us. In addition, it means SAFE engineers no longer need to be network protocol designers and that itself is a huge boost for us. The hope here is that with QUIC we can align with new Internet standards and simply use the protocol that now meets our requirements of security and accessibility. Very exciting to work with this protocol and see just how the rest of the Internet is seeing things as we did so long ago. In essence, this test, if successful, means we can focus on SAFE and less so on any network protocols.We have also been treated to two more posts in the Road to Fleming Forum series from the Routing team. First up was an explanation of Sybil Resistance looking at how the SAFE Network plans to deal with Sybil attacks. The second looks in more detail and tests some of our design ideas in a series of simulations. There has been some great discussion on all of this forum series so far and we continue to welcome your thoughts and comments as we move towards SAFE Fleming.March was also home to the latest Meet up in Brighton. Attendees were treated to an introduction to the SAFE Network by Dug followed by an exclusive look into the new fully asynchronous PARSEC algorithm with Bart. Thanks to everyone who joined us, if you missed it don’t worry there is one already in the diary for May or check the forum to see if there is one coming up closer to you or if you fancy hosting one yourself.Calling all developers! What do you think of the DevHub additions? The DApps page has had an update and now features some of the amazing DApps created by our talented community. If you are looking to get started developing for the SAFE Network, the DevHub is a great starting point and remember there is always someone friendly and willing to help on the forum if you get lost!Speaking of our wonderful community, we hosted a two part interview on our Medium publication with community developer Edward this month to discuss him, his motivations and most recent SAFE Network contributions. We love to see the wider community developing so if there is anything your working on and would like to share, get in touch!As the MaidSafe team continues to grow we thought we would start a short video series to introduce some of them to you. To give you an idea of not only what they do, but how it impacts the development of the SAFE Network everyday. We started off the Designer Jim speaking all things UI and UX and also met Testing and Release Manager Stephen who heads up the QA team. We have a few more faces lined up but who are you most interested in hearing from?It is with some sadness that we are saying goodbye to 2 of the team this month. Douglas and Povilas are moving onto new adventures and although they will be missed we wish them all the best and no doubt we will continue to see them on the forum. We are therefore looking for an expert Network Engineer to join our fast-paced team, if you think your skills and ideals match the SAFE Network please email for more information. Network March Round Up was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 04. 04

Sand Dunes & Digital Mires ...

An Interview With Community DApp Developer / part 2Missed part 1? Read here.Photo by Ryan Stone on UnsplashGreat thank you for that overview. Who do you imagine using your app?Everyone. Your grandma can keep her list of roses that she has in her garden, her will etc. Journalists can keep their investigations on state corruption on it. Companies can keep their data on it. You can have your receipts, unpublished memoirs and your code or inventions on it.. etc.I think we’re ready to get stuck into this now. You’ve talked about the users, but what other type of users are you envisioning or aiming at supporting?SAFE.AppendOnlyDb is basically a simple event store, but it is based on AppendableData, which I implemented over MutableData, according to how it seems to become designed eventually.SAFE.DataStore is more of an experimental document database, with rudimentary indexing and searching capabilities. They will be continually improved as to enable easier and more capable usage in applications. They could even become end user products like data management applications.I have ideas for various applications that could use them, but there’s still plenty that can be done with SAFE.NetworkDrive to keep me occupied with that :)That’s actually a large part of what motivated the development of the data storage solutions; I saw it as the first building block in making end user applications.I have also put an auth client into its own component, which I think can be used by any application, and rather easily. It encapsulates both browser flow auth as well as direct auth with credentials. All of these (AppendOnlyDb / AuthClient / DataStore) can be found as (pre-release) NuGet packages, so they can be experimented with in applications today.How about files with a long history of changes? Is there any type of checkpoint every so often so reconstructing a long history is not needed to get the latest version? (I think you call this ‘snapshotting’)?That’s right, snapshotting. So given the implementation of AppendableData that I have, each AD is an endless sequence of values, split into segments of 1000, (where the first is metadata and the rest is data). Each such segment is based on an MD, which has its distinct location in the network. It makes sense to base the snapshotting on that number (but a smaller or bigger number would work just fine) and what it means is that you would never need to fetch more than one segment, and always have all the data of the AppendableData — no matter how long the history is.Event sourcing is a way of storing data, that captures every incremental change, instead of the current state of things. So since each entry in a segment is an incremental change, you can take all entries from the beginning, and apply them through the function that builds your current state — then you store that current state as a snapshot. Next time you want current state, you don’t need to go all the way to the beginning, you just go to the latest snapshot, and then you apply all new events after it, to it.Let’s take an example:Say you have 999 events in the very first segment in your AD. These are withdrawals and deposits into your account. Adding one more element will make it overflow. At that point a snapshot is made, and passed to the next segment to be stored in its metadata (a pointer to the snapshot rather). The function that builds current state performs addition for deposit and subtraction for withdrawal. You calculate the result of all of them and get a balance of 345 euros. So, your snapshot is that: “Balance: 345 euros”.Then you do another 123 deposits and withdrawals. Next time you want to get your balance, you don’t fetch all 999 + 123 events, but only the snapshot and the 123 new deposits and withdrawals, and you can calculate your current balance. And next time you reach the end of a segment, you do a new snapshot.It works the same with the SAFE.NetworkDrive, but the current state is what the file system hierarchy currently looks like; what folders and subfolders are there, what files, and what are the current pointers to the file content. Every change is like: folder added, folder renamed, file content set, file deleted, etc. etc. This also means that the drive can be restored to every state it ever was in, by just replaying up to that event.Does this become difficult to accomplish given the event-source nature of how files are stored? If so, what are your thoughts around adopting RDF somehow to support portability of data across apps (this is already briefly brought up on the forum thread)? For example, storing files which I can then publish as a website/webapp, or being able to read the stored files with any other SAFE app which manages files.It is a distinct way of handling data, and right out of the box you cannot process event-sourced data with applications that expect a current state model.The way this is handled, is by introducing projections. Let’s say that SAFE.NetworkDrive would have an opt in RDF Projections module. If you enabled that, it would mean that you diverted some CPU, memory, bandwidth and spent some PUTs, to produce a projection of the events, into the RDF format. The RDF data model would be eventually consistent.The file system that is built in memory is basically also a projection of the event stream, so there is already a projections module implemented. Events-to-RDF would just be another one.Apart from supporting it in other platforms like Linux and OSX as I guess must be in your roadmap, what other ideas do you have for the future of the project that can share to inspire others?Yes, Linux and OSX are on the roadmap, and should be fairly prioritised now that there is an alpha for Windows.There is something else brewing actually, an extension to this project, which I think will be quite popular — it’s an end-user thing, not a technical detail. I’ll focus on multiple platforms before announcing it though :)Great thanks Edward!Head over to the forum to join the conversation, and as always, any questions, comments or have a project you’re working on you’d like to share with the team, drop us a line!Sand Dunes & Digital Mires cont. was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 03. 27

Sand Dunes & Digital Mires

An Interview With Community DApp Developer Edward / part 1Photo by Leon Kobus on UnsplashEdward, one the community members in the SAFE forum, announced the alpha release of SAFE.NetworkDrive on Windows a few weeks back.So we took the opportunity to get to know him a little better, why he loves SAFE and to carry out a deeper dive into his project.Enjoy!Hi Edward, thanks for your time. Can you start off by telling us a little about yourself?I’ve been developing systems for CMS, accounting, credit rating, finance and things like that for a few years. But I was always most interested in automation and interfacing with mechanics. As for specific technologies and practices, it’s been all-out C#, a lot of Azure, and very much Event Sourcing, CQRS and DDD, as well as microservices and DevOps. I was at my previous workplace for 4 years developing a system from the ground up. Now I’m going to take some time off before jumping on a new project. I gave all my life to that project, so now I’m going to breathe some air, see my family, spend time with my 1 year old son — and develop for SAFENetwork!I started studying at Uni relatively late. Before that I lived a couple of years with a quite bohemian life: I travelled, met a lot of people and tried to understand myself and others. I lived out of a backpack and was striving to grow socially and as a person. I didn’t care much for anything else — technology, work, career, studies. I hung out with arty people, musicians and cared most of all about living in the here and now. I probably wanted to compensate for my early teens because I didn’t do much IRL socializing then, mostly playing online multiplayer games, and before that reading books and wandering in nature.Then at some point I just had enough of the outgoing life. I longed to refine my skills, utilise my talents for learning and solving problems, and start building something for the longer term. I spent the following 10 or so years with my nose in books, staring into screens, learning, working, building. I’ve always been like that: I immerse myself so fully and totally into what I do. As long as it’s something I have a motivation to do, I’ll eventually be very good at it. Fortunately, as I’ve gotten older, I’ve also become more of a master at maintaining my motivation, seeing where it should come from to stay strong and true.So how did you discover SAFE — and why choose to spend your time here instead of on another project?My first contact with crypto was as a student. With free electricity in my student apartment I was planning to set up a mining rig. It was after the first boom, and it was not obvious that the investment would pay back, so I dropped the idea (it would of course have paid off :D).I then got involved when Ethereum showed up. I was just intrigued by autonomous things, like vehicles or organisations etc. Then, while absorbing all of that, MaidSafe flickered on the screen one day — and after having checked it out, I was convinced by a couple of things. Not only was the technology presented in a much more accessible way than Vitalik’s talks (which I thought would mean a much higher chance of broad adoption). But it also became more apparent as I delved deeper, that the tech was vastly superior as a long term solution. I’ve looked at other things briefly since, but nothing else yet comes close to the ambitions and qualities combined, as far as I have seen.The concept of SAFENetwork, everything it does, and will do, is something I dearly want to see in this world. As a developer, I can also see that the technological foundation is massive and I can see that there is so much skill there, so much hard work going in and constant progress being made.One very important aspect is the technological side of it. Another is the culture of the company and the community. It’s very open and friendly. The SAFENetwork has a very diverse community and it wouldn’t have formed if it wasn’t for what MaidSafe the company itself is. They’ve gathered together people with honesty and integrity and I, for one, appreciate that deeply. It’s just an amazing thing to see it combined with such skill and quality of the technology.Thanks for the kind words — it’s down to having such great support from you the community. We got in touch for a chat because we’re impressed with the work you’ve been doing. Do you want to tell us a little about what it is and why?It’s a virtual drive. A windows application that shows up as a drive in Windows Explorer, just like any external or internal drive you attach — but with the data stored to the SAFENetwork.So, you can move any file to and from that drive, create your folders and so on, all the normal stuff. You can install and run software from it too. I ran SAFEBrowser v.0.11.1 from it!You can manage your drives and even remove all traces of them from the local computer.Once you have connected, you can even work offline without noticing it, and everything gets synched to network when you are connected again.I chose this specific project because I was looking for something to use my database engines for — something that would be useful for everyone. Another member of the community (@happybeing) had been developing a virtual drive as well, but in javascript. I got inspired to solve the problems I saw presented, and saw how I could do that with the database engines I was working on and got very excited to try it out. I am not very productive in javascript, so it was natural to do it in C#.But it also tied in very well with what I need and desire myself: basically I just want my data to exist securely, wherever I am, for me only and virtually ‘for ever’And even though not everyone considers that top priority, they still have the problem with keeping their digital life secured and sustainably organised, whether they know it or not. Everything digital rests on sand dunes and mires, but we’re so used to it being fragile, volatile and chaotic that we see it as normal, not realising how much energy we waste with all of that.We’ll soon be in a time where the digital world is something as solid and concrete as the ground you walk upon, while remaining as private as your own thoughts. Every part of that path that you walked, will still be there, 20 or 40 years later (or more..). No more lost files or data. No more Libraries of Alexandria. And naturally, you want all that to be simple and intuitive.Want to keep reading? Follow the link for part 2…Sand Dunes & Digital Mires was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 03. 27

“The evolution of decentral...

An interview with Devolution creator Glen SimisterPhoto by Joshua Rawson-Harris on UnsplashOne of our community members, Glen, showcased a video a few weeks back where he developed of a non-profit social media platform called Devolution. Here we talk to him about what motivated him, why he chose SAFE as well as glimpse into his future plans.Thanks for agreeing to speak with me! First off, let’s introduce you properly. Can you tell us a little about yourself?To cut a very long story short, I have lived a large part of my life out of a suitcase, moving from place to place, doing various different jobs. I wouldn’t necessarily describe myself as a traveller, more like an idiot abroad. In terms of my skills, I’m what you might call a “jack of all trades but a master of none”. I started off in life doing mostly industrial work. I later went to university where I studied Music Technology. Several years later, I setup a ZenCart shop selling synthesizer presets and later became a freelance web designer. I moved out to India, in an attempt to cut costs, and continued to drift between the UK and different parts of the world ever since. I’ve spent a lot of time in Thailand — where I worked for a Finnish web design company. In my last role I was sub-contracted to a Hong-Kong-based Bitcoin exchange, where I was mostly required to refactor SASS code, and fix the occasional Javascript bug. I currently work for my brother’s company writing articles about security auditing.Great, sounds like you’ve had a interesting journey so far! Right, down to business; what is Devolution and how does it work?DEVOLUTION is a non-profit, open-source, social media platform designed to build communities and give them more political autonomy. It enables communities to vote for officials and finance public services. Revenue comes from voting, adverts and an unofficial Land Value Tax (LVT). The demonstration video that I uploaded included a casino (lottery, bingo, slot machine, etc.). However, as it currently stands, I have decided to omit this feature as I wasn’t able to find a suitable way to verify the age of the participants. Of course, gambling is considered by many as unethical, and in some ways it is. However, one of the main goals of this application is to promote the idea of raising tax revenue through incentives, as opposed to coercion, hence why I thought it was appropriate.All revenue is redistributed in the form of Social Credits, which are used to finance services and/or top-up Health and Education Credits. The application has sections for healthcare, education, business, and even has an affordable housing section. Using the application community members can collectively buy land and install modular housing units (built using aluminium profile technology), as well as toilets, shower blocks, and anything else they need to live comfortably and be relatively self-sufficient. Community members will then register a section of land and pay an unofficial Land Value Tax (LVT) back into the application, which is distributed to all community members in the form of Social Credits. The application has a motto, and it’s one that everybody knows: “Give a man a fish, he feeds himself for a day, give a man the means to catch a fish, he feeds himself for a lifetime”. I won’t go into any politics right now, but if it were possible to summarise my political views in one sentence, it would be something along those lines. do you imagine would use Devolution, and how will they start to use it?Theoretically speaking, anyone can use it, and I’m sure that most people would, if the option was presented to them in the right way. I would like to briefly talk about a technology called SOLID (Social Linked Data). SOLID is a project that is being developed by Tim Berners-Lee (inventor of the World Wide Web). SOLID enables users to have more control over how their data is accessed and stored. Using SOLID, users can setup a profile, which is associated with unique identifier called a WebID. This profile (referred to as a “pod”) is where their data (posts, photos, friends, etc.) is stored. They can use their WebID to login to various applications, and grant or revoke permissions to their data, as and when they choose. Social Linked Data has many benefits and use cases — especially when used in conjunction with the SAFE network, which provides decentralized storage — amongst other things. Devolution will take advantage of both technologies to deliver a social media platform that is as decentralized as possible. This is relevant because even-though Devolution is focused on building physical communities, SOLID will, by default, connect these communities together, regardless of where they are located. Coincidentally, Devolution is built on what I refer to as “the SOLID foundation”. It is a term that I coined before I was aware of Tim’s project, and stands for (S)ound money, (L)and Value Tax, (D)irect democracy.NOTE: The following information may be subject to change.Initially, all users will access the application via single URL, which will look something like this: safe:// When they register, they will be asked to enter their country and post/zip code. The application is divided into three sections; International, National and Local. Each of these sections will have different features enabled. However, for the sake of simplicity, I will only explain how the local section works, and I will need to omit certain details.The local section of application will be customized according to the users post/zip code. The local voting section of the international application will only allow you to elect an IT administrator. When you elect a local IT administrator (or a local IT services company), they will need to clone the application, which will allow the administrator to enable certain features that are only available on the local version. The local version of the application will have its own customized URL, along with it’s own container for the data. This will not only give communities more control over the application, but will also provide greater security. Naturally, you don’t want to trust an administrator that you don’t know, or can’t unelect. The elected administrator will be able customize the application, install updates, authorize plug-ins, and so on. As mentioned previously, all parts of the application that make use of Social Linked Data, will be international by default.Anybody can login to the application, however, in order to vote or receive Social Credits, users will need a minimum “social rating” — a score that is assigned to them based on the number of likes/dislikes associated with their interactions. On the local application, users will also need a minimum number of connections (friends), which serves as an additional verification procedure. In the demonstration video, I spoke about a “voting weight”, which was based on a number of other factors, such as credits obtained via the education section — but I will omit the voting weight for now.How do you plan to bridge the gap between what happens online and offline, and how will you verify that the money was used correctly?Once we have built the first physical community, we will have a consistent revenue going into the application, which we can use to build more communities. It may start off slow, but it could escalate quickly. With regards to ensuring that the money is used correctly; as mentioned previously, every user on the platform will have a social rating, which will serve as a form of trust network. Secondly, I expect registered charities will get involved, as there would be a good reason for them to do so. Actually, given the wide-range of charities that already exist, it would be good to see them take centre stage. We may need to nudge them a bit. Using Devolution there is a way to ask for this. Below the status update input box, there is a select box which allows people to select categories for their post. One of the categories is called “Ideas”, although I will give it a better name — perhaps the old name, GiveMeCredit. Anyway, if you post something in this category, users can vote on which ideas are good and bad, and the most popular ideas can receive Social Credits. So, I could post an idea about setting up a treatment centre, and if that idea is popular, a relevant local charity could step in and apply as a candidate, and if they don’t, we could give them a nudge, or do it ourselves. It also worth noting that people on alcohol or drug rehab programs will likely receive housing benefits, and in some cases this money will go to a private landlord. Hopefully, the community can accept social security payments for the LVT. So instead of our tax money going to a private landlord, it goes back into Devolution, and then back to the treatment centre, and so on. Anyway, this is just one example of how Devolution can deliver tangible, predictable and transparent results.Brilliant, here has clearly been a lot of thought gone into this as well as all the work you’ve put in . You’ve talked about how the app works, it would be good to know what inspired you to build Devolution?After initially dismissing Bitcoin as a gimmick, which many unfamiliar with the technology often do, I decided to look a bit deeper into it, and started to realize how disruptive the technology was (in a good way of course!). I then looked into Ethereum, and various other platforms (including Safe Network), and that was where my enthusiasm started to grow. I was posting my ideas on Facebook and various forums about what I thought could be done with the technology. I also posted some ideas about a browser extension called “GiveMeCredit” on the MaidSafe forum approximately 4 years ago (2015). To be honest though, I never actually intended to code anything, instead I just wanted to contribute to the community by throwing down some ideas and perhaps offering to help with some of the design work. Time passed and I started playing around with some designs, then starting adding a bit of code, and things progressed from there.Naturally, given that Devolution is essentially a political system, there were political reasons why I decided to push forward with this project. However, there’s not really much point in talking about my political views as most of them either are, or will be, included in the design of the application. However, one of my goals was to create a system that catered for everyone, as much as possible at least. Additionally, I wanted something that would complement our existing system, yet at the same time have the scope/potential to become an alternative system, if necessary.It’s great that you’ve been part of the community so long, is this why did you choose to build on the SAFE Network?After my initial post on the forum, I exchanged words with happybeing (as you do) and kept an eye on the progress of the network ever since. I would often check the updates, although I still don’t understand the technical stuff about routing/CRUST. I had already done some basic research into some of the key features such as self-encryption, self-authentication, farming, data de-duplication, and of course, SafeCoin.The promise of scalability was a major factor that retained my interest in the SAFE Network. I’m one of those people who will obsess about whether or not something is scalable/sustainable.When thinking about whether or not to invest in Bitcoin, I was haunted by the idea of a constantly expanding ledger and a room full of mining rigs burning up electricity. Of course, we now have more eco-friendly non-blockchain cryptocurrencies like Hashgraph which — like PARSEC (Maidsafe’s own consensus algorithm) — uses the gossip protocol and is capable of tolerating asynchronous byzantine faults. I wouldn’t know where to start comparing ABTF consensus algorithms, however, as far as I know, PARSEC does it better, and it’s open source! I’ve already mentioned about SOLID, which was another factor that swayed my decision to build on the SAFE Network. Finally, it helps that the SAFE Network has a welcoming community of loyal enthusiasts, and it’s not unusual to see the core developers interacting with us laymen.We’re lucky to have such a enthusiastic community. And you say you’re a layman but you impressed us all with your demo. How long have you been working on this?As mentioned, it started off as a browser extension, which I posted about in 2015. Eventually, due to a number of logical inconsistencies in the design, I decided to scrap the idea. Approximately one year later, I started messing around with what is now Devolution. I first posted some screenshots of the prototype (without the back-end) on the MaidSafe forum in July, 2018. At the time it was called OSDemocracy, although I didn’t like the name much. Most of the initial work was done in Nepal (April 2018). I took a month off work to do a meditation retreat. I couldn’t find an affordable retreat centre that allowed me to stay for one month so I rented a room on a hilltop in a relatively remote location. It didn’t pan out too well as I ended up drinking the local liquor (Raksi), and it went down hill from there — as in I moved off the hilltop and decided to use the free time to develop this application. With regards to the video demonstration that I posted on the forum, I had only downloaded the SAFE Browser approximately two weeks before presenting it, and so even-though It may have looked polished, my knowledge of developing apps with the SAFE API was relatively limited.And how did you find working with the SAFE API?After jimmyhacksthings posted a video on the forum about “Developing Dapps for SAFE”, I thought I’d have a go at creating a simple CRUD (Create, Read, Update, Delete) application. It was surprisingly straight forward. After that I decided to re-build the back-end of my application (or what there was of it) using the SAFE API. Again, it was relatively painless. And this is coming from someone whose palms sweat when asked to type “npm install”. Yes, I have commandlineophobia. Is that why web developers love the command line so much? To scare off web designers? Hmmm. Joking aside, having the API available in the browser made life a lot easier. Don’t get me wrong, I have experienced various anomalies when working with the SAFE Browser, such as needing to restart the browser when it hangs, but these issues will no doubt be resolved before the Network goes live. I would like to see a lot more tutorials about developing SAFE apps — particularly with regards to SOLID integration, as I believe this will be a very powerful feature, and will entice a lot of new developers into the scene. I would also like to suggest that any demos and tutorials are written in JQuery/Javascript. I looked at the code for the demo applications but they were written in either React or Vue, which I found difficult to read. Whilst I’m sure that there are many advantages of using a framework, every web developer can read Vanilla JS, and they can easily port the examples to whatever framework they want. I don’t think it’s as easy the other way around.What are your future plans, how do you see Devolution evolving?It’s a very ambitious project and it will take a long time to complete if I am to do this alone.I will continue to do what I can but I would like to find some experienced developers to help me push forward, while I focus on planning and design. If that means crowdfunding the project or raising money through other means, then that’s what I’ll do. I doubt I’ll experience problems finding developers, as I still have a lot of contacts overseas. Of course, my progress will also depend on the progress of SAFE Network, as well as the documentation.I would like add one final note. I am constantly refining the idea. I may add new features, I may remove some. Simplicity is important to me, as new features can always be added at a later date if required.“The evolution of decentralised governance” was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 02. 13

Why Open Source Software Ru...

Photo by Alex Holyoake on UnsplashLast weekend, many of the team headed across to Brussels to attend FOSDEM, the annual get-together of the free software and open source community. The open source approach to development lies deep within the DNA of MaidSafe. It’s a crucial part of both how and why we do things the way that we do. But what does that mean in practice?What is Open Source Software?At the most basic level, software is just a collection of ones and zeros. And a software program is little more than a language that instructs computing devices to perform specific tasks. For most people in the world, life online is experienced only via what appears on the screen in front of them, whether that’s mobile, tablet or laptop. But of course, the real magic lies in the ones and zeros.Throughout the history of software development, many companies have worked hard to protect themselves from their competition. Many modern businesses rely on their software for their profits. And the traditional way for business to defend itself is to protect via secrecy. So in the early days for many, it was all about building software, protecting the source code and relying on intellectual property to defend that ‘secret sauce’.All well and good. Or is it? Software engineering is built on very different foundations to the more traditional business models of the past. For a start, the marginal cost of producing another set of digital ones and zeros is….zero. As soon as an idea is cloaked in digital clothing, it’s part of The Great Copying Machine that is the internet.In other words: the weapons of restrictive competition that worked so well in the past don’t translate online.The Dawning RealisationOf course, that certainly didn’t stop companies from going down that route regardless. If you’re of a certain age, it’s easy to remember Microsoft’s constant battle against the Windows OS pirates. But it’s become increasingly clear that this wasn’t the only option — and a number of different approaches have developed during the past few years to challenge that belief.The starting point is common sense. Imagine two groups of developers: one has 100 members, the other 100,000 developers. Now let’s have a bet: which group is likely to be the fastest at catching and fixing any bugs in the software? It’s pretty clear: the wider the pool of talent, the more chances you have to pick up on things going wrong.But that’s not all. That group itself is likely to also include a greater number of highly focused problem-solvers (i.e. developers). Now tell them that there’s a problem somewhere. Or maybe that they can’t do something.If you ever worked with developers (or are one), you know what’s coming. Not dissimilar to Cunningham’s Law, you’ve just stumbled across the easiest way to incentivise people to find a solution. So, as our focus online has evolved over the years from simple banter on bulletin boards to actively relying on software to carry out many of the most crucial functions in daily life (think financial transactions, identity theft, security of digital and physical assets), we see the mounting cost of critical failure. So it doesn’t take long to see the appeal of having an exponentially larger pool of talent to work with when it comes to making your software resilient.The Process of CreationSo open source is good for bug-catching. But what about new ideas?In general, innovation comes down to one of two options.Number One: Build a skunkworks-type model. Close the doors and hide everything from sight until The Big Reveal! Explode from nowhere with your perfectly crafted software that has solves a massive problem for a corner of the world, make a ton of money and retire to the Bahamas. Congratulations!The reality to this approach is quite different. After spending months or years building the foundational parts of your software, re-inventing the wheel in many cases, you burn through piles of cash and release your product — only to realise that the world never really cared in the first place. Or, if it does, someone else might already have come up with a better solutionSo What’s The Answer?Number Two: rely on software that others have built and tested. Improve it where possible — and give those improvements back to the wider community to do with as it wants.It may be counterintuitive — but in a huge number of cases, this alternative is far more compelling. And it’s not new. The idea of closed versus open ecosystems online is a battle that was won decisively back in the late 1990’s when AOL/Compuserve’s attempts to provide services via the Walled Garden approach were steamrollered by the open and permissionless nature of the World Wide Web.And not only do we all collectively benefit from software when ideas and quality control can come from anywhere around the world. When it comes to security-critical code, the greater the number of reviewers the better. Why would you not want to test the resiliency of your code in the face of the strongest possible attack? Because as soon as you go ‘live’ into the wild of the internet, you can guarantee that attack will come. We also now have systems in place that ensure that critical, foundational software programmes can be ‘locked open’.The World of Open Source LicensingWhilst building the SAFE Network at MaidSafe, we’ve always been crystal-clear: you can’t build a permissionless, decentralised peer-to-peer autonomous next generation network unless it is open source. Whilst the roll-out of the Network will see a number of different stages, there are two key ones to focus on here: the release of the SAFE Network, built on the SAFE Fundamentals and the Decentralised Applications (commonly known as DApps) that will run on the Network.The SAFE Network ensures that the foundational core software for the Network is locked open. We do this by licensing the core libraries under a GPL v3 licence. That ensures that whatever anyone develops based on that licence must also be provided by them open source. This prevents someone coming in, forking the code and setting up a SAFE Network with the same code but with restrictive rights — for example, Google deciding to run a closed source version of the Network.However, when it comes to Crust (the way computers connect to each other) and the SAFE API’s (the way that software developers can interact with the Network), you’ll find that these are licensed either MIT or BSD licences. These are known as permissive licences because they are free and have minimal requirements about how they can be redistributed. These simply require attribution but enable individuals to use the software to build their own, proprietary projects on top of.Taking this licensing approach in the SAFE Network prevents anyone from taking the core code and using it for personal gain in a way that would exclude others. But it also gives the flexibility to others who want to build ventures on top of the Network once it’s live.The open source foundations of the SAFE Network are vitally important to its continued success. It enables us to keep the core platform open to everyone whilst providing flexibility to application developers. We’re convinced that being community-led will help the Network to prosper and as a result, we’ll continue to protect its open source principles forever.The FutureBack in 1675, Sir Isaac Newton spoke of seeing further by ‘standing on the shoulders of Giants’. At its core, the open and permissionless nature of our work is not simply a nice-to-have. It’s an essential component. Because by breaking down the barriers between projects, you’re in a world that encourages you not only to work with others — but also it ensures that every effort can be used somewhere, by someone. The unfinished attempts of any project can be picked up and completed by another.It doesn’t make sense to work at solving mankind’s current digital problems if they’re built on weak foundations. That’s exactly what centralised data stores with their security weaknesses and broken privacy represent. We need to build the best technology possible. And that’s why we’re committed to open source development and keeping those gates open. Because this is work that’s far too important for us to do on our own. It’s a job that needs all of us to do our part.Why Open Source Software Runs In The SAFE Network DNA was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 02. 06

January SAFE Network Summary

upsplash.comWe returned from our festive break raring to go and it shows with the amount of progress and work currently ongoing in the Network. This month has been filled with releases, updates and a lot of research across teams.The Front-End team have been on fire this month with three releases. A new Java API, an updated C# API and an update to the SAFE Browser. The release of the Java API means that developers, like you, can now create native Android apps for the SAFE Network. This release not only contains this new API but also an example app and tutorials to help developers understand and begin utilising this new release. Development superstar Lionel has not only been working with the rest of the Java team to create the latest APIs, but has also become the face of the Java release as he created a step-by-step guide to the release, tutorials and example app but also featuring on the SAFE Crossroads podcast. But it was not only Java developers who were treated this month. The C# API also featured a new update and the release of a new example app and tutorials (for Windows and mobile). This update enhances your ability to develop .Net decentralised apps on desktop and cross-mobile platforms using Xamarin. Following the successful release of the SAFE browser v0.11.0 at the tail end of last year we have just launched an update to v0.11.1 to fixes some bugs and provide incremental updates. As always we are thankful to our community who diligently test each new iteration and help us make the SAFE Network as user-friendly and community-driven as possible. Please download this new version of the Browser from GitHub and let us know what you think.Delving into the backend we can also see some key updates. The Crust team improved both reliability and security of connections by introducing what is called the ‘external reachability test’. This means that honest nodes will not let other nodes join unless they are externally reachable — in other words, able to connect to each other. A node will now undergo a mandatory check to ensure that it is externally reachable, as well as switching from simple TCP to an encrypted Crust request/response system. Ultimately, this is another mechanism by which the SAFE Network security front and centre.The Routing team have been squirrelling away at the PARSEC and Fleming work and there will be a lot more detail on that in the very near future. Most recently the teams have been dedicating time to the design of network restarts and how nodes reconnect following a restart in a number of different scenarios. The Fleming team has begun the release of a series of forum post outlining the research, design and plans for their upcoming work towards SAFE-Fleming. These will be released regularly on the SAFE Forum with the first looking at the Road to Fleming already available. These should give you an insight into the work the team is undertaking as well as the opportunity to provide feedback, comment and suggestions.In terms of team appearances this month, Dug was on the popular and CrytpoBeadles YouTube show and Ernest Hancock’s ‘Declare Your Independence Show’. Founder David however, wasn’t going to let Dug take all the limelight with a feature on the IRL Podcast which we expect to be published in February so keep an eye out for that one. We finished off this month with a live interactive developer session with Front-End double act Josh and Gabriel. Following an overview of the SAFE Browser, its recent updates and run through of the coolest features including the ability to toggle between mock and non-mock versions of the Network and the ability to access any data type through XOR-URLs. They also took questions from the community to help people who are currently building DApps on the SAFE Network. Some new faces have also graced the MaidSafe team and we are featuring them on the Medium publication this month with the introduction of the newest members of the Chennai team. Joining technical teams across the business these new starters, including three interns will no doubt be on the forum and you will hear much more from them soon.Here’s to an exciting 2019! SAFE Network Summary was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 02. 01

Chennai Welcomes More MaidS...

Join us in welcoming even more new starters, all based in the Chennai office. Each joins the MaidSafe team from a variety of backgrounds but is driven by the same purpose — to build the SAFE Network and give users back control of their data.Vigneshwara, Java DeveloperOne of my earliest memories of computers goes back to more than 15 years ago when I was in primary school. I knew I liked it the moment I knew I could play games on them.I started using the Internet through the good old Internet Explorer just to see if I could play more games online.For the seven year old me, there wasn’t much of a distinction between the Internet and Google. They both seemed the same to me. Until I was in my early teens when I understood for the first time what the Internet actually was. Only then did I discover the world of Wikipedia, Facebook, YouTube, etc.The Internet made my generation very different compared to previous ones. Friends were always a couple of clicks away and I preferred to stay home connected to the Internet as I grew older.As a kid, I would always envy those who had the latest software like Windows OS and would bug my dad to upgrade with futile results. But then, when I was in 9th grade did I come across something called Linux. I was amazed because they were just giving an OS away for free when people paid thousands of rupees for broken OS like Vista! However, I was not able to experiment and explore the digital world until I could afford to have a personal PC when I joined University.During my schooling, I was fortunate enough to pick Computer Science as an elective and it introduced me to the world of programming. I was able to program with just basic knowledge and I wasn’t required to take exams where I just had to barf stuff from textbooks (although this wasn’t the case with most of the other subjects courtesy of the Indian Education System).In University and for some time before that, I became increasingly aware of the problems plaguing the Internet and its users. It didn’t take me a lot of time to figure that the most important tool of the 21st Century, the Internet, was a product of the previous century. It was broken and couldn’t keep up with necessities of today.Today’s Internet has evolved so much that even its inventors couldn’t have fathomed what it is today. With millions more joining the digital world, this is not just a matter of improving on a luxury. We havea dire need to reconfigure the Internet, fundamentally alter the way it works and take away control from organizations who seek to control the Internet for their private gain.And what a better way to fix the broken Internet than to work for an organization like MaidSafe. Ever since I heard of it (fhanks to the HBO Silicon Valley series), I’m convinced that a new distributed decentralized internet is the way forward.And I truly consider it an honour and gift to be part of the Web 3.0 movement.Yogeshwar, Client Libs teamHi, it is an immense pleasure for me to be a part of one of the most ambitious projects of the Internet era. To say a few things about myself, I would consider myself to be an aspiring Data Scientist. I was introduced to this field during my freshman year. I soon discovered a profound passion towards this domain as it had suited my natural individualities of playfulness and exploring. After all, Data Science is all about fiddling around and finding hidden patterns inside data.At first, I started coding projects on my own and started participating in events around my academic studies. Soon enough, I found myself being useful to the industry. I started doing internships; firstly at the Institute of Technology Management & Research-HTC, Chennai. I led to a team of four at that timebuilding a Voice-Bot for Workflow Automation on Vehicle Loans.My second industry experience was at Nokia Solutions and Networks, Chennai. Yes! The Man, The Myth, The Legend kinda company we all were once a customer of. I was again in charge of leading the team to work on various projects for the organization — including Object Detection using Neural Nets, Environment Recognition and Danger Alarm Systems using Computer Vision.After successfully developing these projects, the Council of Scientific and Industrial Research (CSIR), Chennai, was my next stop whereI was Research Intern for six months, during which I had the chance to work on Fractal Analytics.And then came the enlightenment — MaidSafe.After a series of hackathons and interviews, I was delighted to be picked to join as a Front-end Developer. MaidSafe is the place where I came to really learn about the dark secrets and the cold wars that happen behind the scenes over the internet for control. I love being a rebel with a cause — and it’s a crucial cause:providing Privacy, Security and Freedom for everyone. So I just couldn’t control the excitement to begin development for the project that I believe will save the Internet. Cheers!:grin:Mohamed, UX/UI DesignerI was born and raised in Pudukkottai, Tamil Nadu, India. I’m currently in my final semester of College pursuing Computer Science degree from Anna University, Chennai, India. Right from my childhood, I have always liked perfection in everything. I like to look at the world from a different perspective and always wonder how nature seems flawless. Being an only child, drawing always helped me pass the time apart from studies. I started drawing many things in my own unique style which laid the foundation of my creative career. I love listening to classical music and play thepiano. Classical music has helped me to think deeply and differently.“Creativity is just connecting things. When you ask creative people how they did something, they feel a little guilty because they didn’t really do it, they just saw something. It seemed obvious to them after a while.” — Steve JobsI’m really inspired by Steve Jobs. The way he saw things differently and his love of perfection has influenced me greatly. I started designing as a hobby in my college days. In my sophomore year, I made some friends in the senior year who were very good at coding. But amongst them was this one senior who was completely unique with his designing skills. That had a great impact on me and tempted me into giving design a try. Learning some of the basics from YouTube, I started designing simple illustrations within days. I learned many things about design before entering my Junior year.My friends started attempting “Coding Challenges” which inspired me to start “The Daily UI Challenge”. I designed illustrations, UI Screens, some small animations everyday and posted on social media to get some feedback. I received a lot of criticism initially but within months I got some real appreciation. I got many projects from my friends, relatives and even from my college. With this as my initiation, I started learning User Experience design and how important they are to any design.So, this led me to take up the interview for the position of designer at MaidSafe when they came recruiting to our college. When I landed the job I was thrilled because the ideas and goals of MaidSafe are unique and represent a way forward for the Internet. It seems like the fulfillment of a childhood dream. I have only been part of the team for a little while but even this short duration has taught me so much. I greatly look forward to more amazing things as part of this team.Chennai Welcomes More MaidSafers was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 01. 28

The Next Generation of Maid...

As we kick off 2019, we’ve been joined by a number of new staff and, as is the tradition around these parts, we’d like them to introduce themselves to the community. Today, we’re starting off with a few ‘hellos’ by three top-notch interns who’ve joined various teams and are all based in the Chennai office.Ruthra joins the UX/UI team to work alongside Shankar and Jim, Manuav joins the JavaScript team and Muralidharan joins Ashwin, Ravinder and Lionel in the C# team.MuralidharanHello everyone, Muralidharan here, writing my first ever blog — I’m really excited to be at Maidsafe! I hail from Tirunelveli which is a part of rural India located at the foothills of the Western Ghats, famous for its Halwa (popular Indian dessert) and waterfalls. It is popularly known as the Spa of South India. I have always been an inherently inquisitive person to know everything that I come across. During my school days, my dad would say “I know you possess great potential within you, then why aren’t you making use of it?”. His words have always motivated me to push myself to reach new heights. Since my childhood, I have been fascinated by two things; Neuroscience and Computer Science. And I’m glad I took the decision to pursue Computer Science as my college days have been instrumental in shaping my life. Very early on in college, I came to the realization that, I never achieved anything great by just going by the book. Ever since that epiphany, I have pushed myself to do more than just study and be a bookworm. I took every opportunity that came my way. This helped transform me from just being a bookworm to an all-rounder who is now a developer. I am a field hockey player and have represented my college in competitions which I consider one of my notable achievements. Being an NCC cadet provided me with numerous life experiences and adventure. One reason that has kept my love for learning Computer Science intact is the burning desire to be able to know what occurs when you type and press enter, you can pretty much tell what happens from the address bar all the way down to electrons. AND YOU LOVE IT. You feel like you own the whole stack and you understand computers like your friend from a mechanical background who understands internal combustion engines. Just like the curiosity that leads you to open the hood of a car and play around. I started exploring with the compiler when I got my 1st ever computer. When you learn something new, you want to open it up and see what makes it tick. You want to see how it relates to what you already know. You know you will be successful because you can have a FEEL for the whole system from the computer science perspective. When the opportunity to join Maidsafe came, I was really thrilled because of the fact that I get to be a part of something new and original. I feel inspired by the knowledge and expertise of team members who are from different parts of the world but working in unison to provide privacy, freedom, and security to everyone in today’s data-populated internet world. I believe that this community will provide me with a whole new experience helping me grow both professionally and personally. I am passionate about technology and looking forward to contributing to the SAFE Network project, in the coming days. Cheers!ManavHi everyone! I’m Manav Chhabria and I am the newest member of the JavaScript team here at MaidSafe. I study Computer Science Engineering at Sri Venkateswara College of Engineering and pretty much spend the rest of my time gaming and writing code, with the occasional break to catch up on my favourite shows or a movie. I’m also a huge foodie and I like to cook, but I’d any day rather just binge on awesome food and kick back in front of my TV and watch a United match. I did go through a phase where I believed I was an awesome stand-up comedian but a few open mics cured me of my disillusionment. Thankfully, development saved me. I’ve always been intrigued by cryptography, networks, and Web development. My passion for figuring out the building blocks of our current network structure led me to do a network-based internship for a local firm in 2017 which was also where I became fascinated by how the team analyzed the needs of clients. When I got an opportunity to do one more internship, the most logical option was to intern with another Chennai-based company, this time a web development company called Smartapp. It was an amazing learning experience, but what I value most from my time there was that I learned how to structure code to better design end products. I’ve always enjoyed new tech and it constantly amazes me as to how it makes everyday life more convenient and productive. By my third year of college, I had absolutely no doubt that I had made the right choice to follow my passion for computer science. Yet I was looking out and seeking to learn more about new languages, frameworks and the Open Source Community which I feel strongly about because it makes source code accessible to anyone anywhere, which is how I believe how all projects should be.I knew instantly that I wanted to contribute in some way to Open source projects. At the time I was not sure which project to contribute to and I felt my skills were not suitable for most open source projects I came across. And I continued to look for a role that would not only inspire me but would also keep me on my toes and help me make a difference in a way I value. That is when I came across Maidsafe.The concept of a decentralized Internet is something that appeals to me especially and intrigues me. MaidSafe have always promised to give privacy, freedom, and security back to the people and I know how important this is in today’s world. And here was a company that was working towards making this a reality. Being a part of something new that inspires me has always motivated me to do my best. And here I was suddenly presented with the opportunity to work for my dream company. I’m very excited to be at Maidsafe as I share the same values as the company believes in providing Privacy, Security & Freedom.RuthraI am excited to be part of Maidsafe working with the UI/UX team, am looking forward to working with you all and fascinated to be a part of building the SAFE Network.I’m a student in my last semester of Computer Science Engineering and I’m really excited to start working even before completing my degree. During my school days I was interested in programming in C++ as it is the base for everything. This led me on to study Computer Science Engineering. In my college days I started developing my skills in programming, as well as in web development, developed few applications like Leave Management System(s?), Inventory Management system(s?) and attended workshops and presented a paper in Anna University.I also have some experience in developing websites in WordPress. By the end of third year, I undertook my first industrial experience with an internship at Zoho. Like many final year students, I had a thirst to get placed in a good company, and to fulfil that wish Maidsafe came to our college for campus recruitment, and I was offered an internship. And now am here.The Next Generation of MaidSafe Team Members was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 01. 18

How We Support Native Andro...

Photo by Edho Pratama on UnsplashLast week we announced support for SAFE development on the Android platform with the release of a new Java API, updated mobile SAFE Authenticator and an Android App tutorial. You’ll find more detailed information on the forum post here.Today we’re releasing a video run-through by one of the team, Lionel Faber, to give you a better feel for what you can do. Lionel was also interviewed on the most recent edition of the SAFE Crossroads Podcast. video shows how to build native Android applications for the SAFE Network using Java. You can do this by working locally initially on a ‘mock network’ in order to develop and test your new app. Once you’re happy, then it’s straightforward to migrate this to the live Alpha-2 Network.Self-authentication is a crucial part of the SAFE Network. It’s the way individuals connect to the Network without requiring the permission of any third party. This is where the updated mobile SAFE Authenticator comes in — because if you’re building a SAFE app (or decentralised application) you’re going to need a way for the user to authorise your DApp in the first place.There are two types of data on the SAFE Network — Immutable Data (where the data’s hash is used as its storage address) and Mutable Data (where data can be either public or private and also modified by an owner — which gives a user the ability to choose which DApps can access which data). In other words, the individual remains as always in control of his or her data. By running the tutorial, you’ll be able to see basic Mutable Data operations being carried out.The release also uses product flavours to switch between mock and non-mock versions of the Application. In addition it has been built to enable the DApp’s own container to be used (meaning that the DApp remembers where to find the encrypted, stored information about the data (Name, type-tag etc) each time it’s launched).It’s a big step forwards. This gives mobile Android Developers the tools to build the next generation of decentralised applications on the SAFE Network. That should appeal to anyone who’s focused on ensuring privacy, security and freedom for a global network of users. It’s an opportunity to build mobile applications whilst avoiding the pain of server setup and leaving behind the usual worries about securing users’ sensitive personal data yourself. And, once the Network’s currency is released, SAFE apps will provide a built-in revenue stream for developers, paid to them by the Network based on the popularity of their application.So if the thought of building decentralised applications on the world’s first autonomous, permissionless and censorship-resistant network is something you want to learn more about, hopefully you’ve got the detail to get started. But if you do have any questions, please jump into the Forum thread and the Community will be keen to give you a hand!How We Support Native Android Development on SAFE was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 01. 16

Building The SAFE Network i...

Photo by Stephen Leonardi on UnsplashAs we stand at the start of 2019, savouring the memories of another Hogmanay, we view the new year stretching out in front of us — and we can’t wait to get stuck into things!We’ve already pushed out our first significant release of the year providing support for developers to build native Android SAFE apps. But before diving headfirst into all of the hugely exciting things that 2019 promises, it’s a great time to reflect on what the last year delivered for the SAFE Network. As the MaidSafe team continues to grow and the releases continue to stack up on GitHub, it’s easy to lose track of just how much progress has been made, both by MaidSafe and the wider community.So if you’re new to the SAFE Network, first off — welcome! Hopefully this will give you a place to start from when taking a deeper look into the progress that has been made.The SAFE Network FundamentalsWe worked this year on distilling a number of essential truths about the SAFE Network into a list of twenty one Fundamentals. You can read these on the website but if you’re looking for a little more context about why each of these has consistently guided the design of the Network for the last twelve years or so, it’s worth checking out the post on the Forum that explains the context.PARSECUp there with the biggest news of the year was the release of the Protocol for Asynchronous Reliable Secure and Efficient Consensus (PARSEC). In May 2018, MaidSafe announced the release of PARSEC, a new completely decentralised, open source, highly asynchronous Byzantine Fault Tolerant consensus mechanism. In other words, it’s the method by which a global network can come to agreement on what happened, and when, without requiring any centralised authority.Much of the rest of the year for the Routing team has been focused on integrating this into the SAFE Network and we’re hoping that many other projects take up the tech and use it for their own purposes. You can read more about it in the White Paper, the release of the code, a number of podcasts, technical and not-so-technical videos, a TechCrunch article and many other places!CrustThere was plenty of excitement amongst the community when we released a couple of tests to see how our peer-to-peer networking library Crust (Connections in Rust) would fare in the wild. Between both the first Crust test and the second, we saw some fantastic results. So after involvement from 37 countries and over 20,000 attempted connections, with connections into and out of China also very strong (88% success rate overall), we’re happy to say that people are able to connect to each other directly! We also found some interesting evidence of issues out there that support our fundamental stance that all data on the new decentralised Internet needs to be encrypted.SAFE and SolidGreat progress was made in 2018 between Sir Tim Berners-Lee’s SOLID project and the SAFE Network. By building the framework to ensure that data is saved on the SAFE Network in a way that is compatible with Solid’s semantic web approach, we’re able to ensure that our shared visions of total user control of data and excision of the third party aggregators who currently control and use our data in ways that we don’t intend are able to fit snugly together.We released a Proof of Concept to highlight this in July 2018 called Patter. A Twitter-esque proof-of-concept, you can check out the details here (Josh’s blog post and this podcast). What’s more, the new SAFE Browser has support for RDF data structures!VideosWe released a range of video content this year — from explaining the difference between the SAFE Network and blockchain-based storage, to a couple of videos funded by the Community Engagement Programme (talking about the currency of the SAFE Network and the Proof Of Resource mechanism).CommunityThe Community really took strides forward this year with regular meetups in London, Chicago and Brighton. Community member @fergish continued to forge ahead with his SAFE Crossroads Podcast. And it was fantastic to see the SAFE Network Primer being produced in January by the community, giving newcomers a straightforward document to take a look through when they first explore the project.The team were also out and about talking at a variety of conferences events, including FOSDEM, MozFest, RustFest Paris, RustFest Rome and RustRush amongst others. And we held the first ever SAFE DevCon in April 2018. It was an amazing day with the entire MaidSafe team in attendance and a huge number of well-known community members meeting each other face-to-face for the first time ever. You can watch the videos from the day here — and news of SAFE DevCon 2019 will follow soon…New WebsitesThere are now three key websites: we released (for newcomers, privacy advocates, journalists), SAFE DevHub (for developers and more technical types) and then we’ve reduced the prominence of to reflect the primacy of the Network and community over MaidSafe as an organisation. That brings it more in line with the ethos of the project, whereby the Community run the forum and a number of the social channels such as Telegram and Reddit.Publicity and News StoriesIt was an exciting year for news stories. First, we were able to talk about the fact that David, Viv and Nick had been acting as advisors to HBO’s hugely popular ‘Silicon Valley’ show. And Hollywood continued to sniff around the Network with the appearance of the SAFE Network in unexpected places — not least ‘Wreck-It Ralph 2: Ralph Breaks The Internet’.All of this came on top of the fact that the world is increasingly looking into the decentralisation of the Internet to solve some existing problems. In a year of trials and tribulations for Facebook, Google and others, MaidSafe and the SAFE Network were profiled in a piece in The Guardian newspaper whilst we also sponsored the Decentralized Web Summit in San Francisco (somewhat ironically…) in 2018. We also introduced more ways than ever to follow the project — including the new Email Mailing List and watching MAID via various coin apps (Blockfolio, BitUniverse, Delta Direct, CoinGecko).MaidSafe Team GrowthThe MaidSafe team has continued to grow over the past twelve months, not least with the opening of a new office in Chennai, India. We’ve had 12 new starts around the world in the past year, a growth of 26% in the total headcount. Most have introduced themselves here in case you’d like to get to know the team a little better (you’ll find them on the safenetwork Medium publication).Community AppsWe saw some strong growth in app development from the community during 2018 — from the JAMS! music project, to SAFE Drive, Project Decorum, SAFE-CMS, SAFE-Search and SAFE CLI Boilerplate amongst many others. Particularly given the Android release this year, we’re looking forward to seeing this area really grow in the future.So: What’s Next?2018 saw huge steps forward for the SAFE Browser (including the most recent v0.11.0 release), Web Hosting Manager, the rebooting of the RFC process (such as suggestions for XOR URL’s on the Network) and far too many other areas to mention.And 2019 is shaping up to provide even more excitement.We’re moving on towards the release of SAFE Fleming: that means PARSEC fully integrated into the Routing layer, with Dynamic Membership, malice detection, our sharding solution (Disjoint Sections) and Secure Message Relay all working as we enable everything to run decentralised routing nodes from home. Work will continue on embedding RDF support within SAFE whilst we start to really focus on bringing UX principles into a more foundational level within the software — together with a whole raft of other new and exciting improvements!In the meantime, we’ll continue to be out there, spreading the word and working to collaborate with anyone who’s interested and shares our vision of a fully-decentralised Internet with security, privacy and freedom for all.So whether you’ve been involved in running tests, submitting code, finding bugs, chatting on the forum, running meetups, giving talks, sharing the progress of the SAFE Network across social media, we’d just like to say thanks for all your support in 2018.Roll on 2019!Building The SAFE Network in 2018 was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 01. 10

The SAFE Network Goes Mobile!

Today, we’ve got some good news to kick off 2019. We’re pleased to announce that we’re releasing support for building on the SAFE Network for Android mobile developers!Photo by Greg Rakozy on UnsplashSummaryWant to develop mobile DApp’s (Decentralised Applications) for a truly decentralised internet that will ensure that every user has complete control and security over his or her data? Now you can.What are we releasing?Self-authentication is a fundamental part of the SAFE Network. It means that anyone can join the Network at any time. But, just as importantly, it also means that no-one can be prevented from joining. Creating an account, authenticating yourself and authorising applications so that they can only use your data when you allow them to do so — this is all dealt with by the Network autonomously. There are no third parties involved.Until today, users on the current Alpha 2 version of the SAFE Network were required to use the SAFE Browser to access the Network using their desktop. This is because access came courtesy of the SAFE Authenticator (which is currently part of the SAFE Browser).But from today, users can also access the Network using Android (7.0 Nougat, API 24). Initially, we’re putting out a proof-of-concept that can be found on GitHub. But in the very near future, you’ll be able to download the Android Authenticator App from the Google Play Store for your mobile.And just as exciting is the news that we’re also releasing a new Java API. Why exciting? Because for the first time ever, developers can build Android applications natively on the SAFE Network. Or to put it simply, a developer isn’t just restricted to thinking, “I’d love to create a decentralised [insert app of choice] on the SAFE Network”. Because from today, she actually has the tools to start.Of course, let’s not get too far ahead of ourselves. Work continues to steam ahead towards the full release of the SAFE Network. The next major roll-out (the SAFE Fleming Release) is just around the corner. But from today, we’ve opened up the doors to mobile developers to start experimenting, investigating and preparing the groundwork to be ready for launch. By opening up another world of possibilities for the developers out there who share our views about the type of Internet that civilisation needs in order to grow into the future.Check out the DetailsNeed more details? The best place to head is to the SAFE Network DevHub where you’ll find all of the documentation you need, including the Java API documentation. And if you feel that it’s time to get involved? Give us a shout either here or on the Safe Network Forum and either the SAFE Community or the MaidSafe team will be more than happy to lend a hand.The SAFE Network Goes Mobile! was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


19. 01. 09

Keeping 2018 SAFE and Solid

Keeping 2018 SAFE and SOLIDPhoto by Sai Kiran Anagani on UnsplashYou may have noticed a recurring theme across the SAFE ecosystem and beyond this year. The conversation around the ownership of data is picking up pace. Perhaps you were at (or watched) SAFE DevCon 2018. Or perhaps you’ve stumbled across a podcast discussing words such as RDF and Socially Linked Data.The word ‘Solid’ is appearing more frequently in conversations — but why? And what does it mean for the SAFE Network?SAFE of course is about three things:-Security: no-one can access your data without your permission.Privacy: data is only shared with those you choose (if and when you want to share it)Freedom: of association, contribution, collaboration (amongst many other rights).SOLID (short for ‘Social Linked Data’), on the other hand, is a project that was started by Sir Tim Berners-Lee that defines a set of standards for the representation of data which ensures that ownership remains with you as an individual.As you can see, when it comes to the vision, there are more than a few similarities between the 5-year old Solid and 12-year old SAFE projects.Over the Summer the team were out in San Francisco at the Decentralized Web Summit 2018 and gave an overview of the work that had been carried out to date in combining the principles of SAFE with the conventions of Solid before such internet luminaries as Sir Tim Berners-Lee and Brewster Kahle. And it’s now worth taking stock of the progress that we’ve made to date.SOLID is driven by the desire to ensure that everyone gets back control of their own personal data from centralised platforms. So a SOLID web application simply becomes a way of displaying data from many different sources that you choose — without you losing ownership of your data. In other words, SOLID wants you to choose exactly where to store the data that you produce and then use URL’s (Uniform Resource Locators) to access that data moving forwards in a way that gives you control.The concept is brilliant. But this brave new world envisaged by the Solid community doesn’t yet tackle one of the crucial problems out there — how to secure the data itself (regardless of where you have chosen to store it).And that is exactly where SAFE comes in.Because by using the SAFE Network to store your data, it now lives on a server-less, trustless autonomous network. No trust is necessary as the encryption key for a user’s data never leaves the user’s computer and no identifiable information is shared with any other peers. So by building these types of concepts into SAFE, developing applications becomes much easier — because all concepts of authentication, authorisation and data security are already taken care of by the Network itself.In other words, it’s a future that delivers on the goals of both projects. But how will it work?We started by focusing on two key objectives: data on SAFE had to be portable (so users could switch applications at will) and for that data to be self-descriptive (to enable users to define how their data could be searchable on the Network in ways that would bring them the greatest benefit).For this reason, we adopted the RDF (Resource Description Framework) standard used by Solid. Having a standard way to store data on SAFE is crucial for scaling the project. And it also enabled us to build some utilities that would help developers in the future.For example, WebID’s were introduced. These are simply a way of having an identity on the Network that you can share with other people using a URL. The data that is produced is stored on SAFE in the RDF format. You can see this in the WebID Profile Manager that we built (where you create your own profile with a human-readable URL) and also in the WebID Switcher (which enables users to choose any of his or her WebID’s to access any particular application on the Network). And if you want to try that out today you can — just take a look at Patter, our proof-of-concept Twitter-style clone.What’s more, by publishing WebID’s on the SAFE Network, it solves the well-known problem faced by anyone who’s ever suffered as a result of malicious actors exploiting the current weaknesses of the current DNS system. For example, all it takes today is for an ISP or DNS server to be attacked for you to be redirected to a malicious server. What’s more, no-one has full ownership of their domain name on the Clearnet — you simply have a registered right to use it which can be removed at any instant. Relying on SAFE removes this vulnerability.So how is this relevant today?This week we released an update to the SAFE Browser. Get involved and download the new (v.0.11) release today. It contains plenty of functionality to ensure that the symbiosis between the two projects gets closer. There will be far more to come but at this stage, we’re just glad to see more people are getting excited by the thought of improving the future that we all want to live in.If you are new to the SAFE project, you’ll be able to get an invite to take part by signing up and spending around an hour reading the Forum []. And if you feel that this is a world that you want to be part of, please come join us. Take control of your data — and secure it with the SAFE Network.Keeping 2018 SAFE and Solid was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


18. 12. 19

New team mate at MaidSafe, ...

Hello! everyone this is Vinitha Vasanthkumar and I have joined the Chennai MaidSafe office as an Assistant Manager. I am from Chennai, India and have spent most part of my childhood in the middle east, Oman. I speak English and 4 native Indian language Hindi, Tamil, Malayalam, Tulu and have elementary level proficiency in French and Arabic. Being exposed to diverse cultures and communities early on makes me an inclusive and adaptive person. I trust that people and places bring out the best in me. So, I began working on the art of driving team collaboration and facilitation. What keeps me going is bringing positive transformations to people and organizations that I connect with. An emphatic spirit that believes in the power of humanizing business to solve problems better. On a personal note- I am naturally inclined towards spirituality and have been practicing yoga and meditation for over a year now. I hold 5+ years of professional experience, 4 in Business Analysis-Digital Transformation and 1 in Agile Project Management. Taking you through my journey, right from the graduation days until now:I did my under graduation in BSC. Information Systems Management from SRM University, Chennai. The course helped lay a foundation in concepts of system engineering and management that culminated in my 1st job with cognizant as a Programmer Trainee. I worked on support and enhancements for an HR Payroll App that dealt with the payment processing for Cognizant. I dabbled with coding using C# and.ASP Dot net technologies, interacted with business owners and project stakeholders as a part of requirements discussion and project status update meetings. It all came to me then that I had a natural flair in understanding the need of the business, to come up with solutions through collaboration with a wide array of people. To further direct my career, I did my MBA in affiliation with Bharathiar University — specializing in marketing and Information Systems Management. As luck may have it, I landed a job with a start-up called Enterprise Touch in Chennai as a Business analyst for mobility and web app projects for government organizations in Qatar. The fast-paced environment of a start-up is such that before I could even realize, I was handling requirements for multiple accounts — ensuring that the design, development, testing activities were aligned with the requirements also facilitated UAT activities with the customer. I have designed processes and documentation practices based on project and customer requirements. Gained exposure and understanding of technologies/platforms like Kony, OutSystem, and ORACLE APPS. My work involved being constantly engaged with clients to forge better relationships, manage expectations, which resulted in clients signing us on for more projects. Mid of last year, when the organization had to respond to the order of the day with adaptive planning methodologies. The head of delivery decided to set up an Agile practice and I was identified as one of the agile champions endowed with the responsibility to drive adoption of scrum within project teams and clients. I took up a CSM Workshop and certification with scrum alliance to support this initiative. Simultaneously, worked on a mobility project for a telecom company as a project manager/scrum master. I performed the functions of planning and executing within a time-box and budget, managing resources, highlighting project risks and dependencies to a customer, facilitating project meetings and managing releases.Most recently associated with L&T Infotech managing the BA & project coordination activities for the OTIS Mobility account before MaidSafe happened. I stumbled upon MaidSafe through an HR Consultant who asked me to try out for an opening with the Chennai office. Over the next few days, I started reading up about MaidSafe. The sheer novelty of an autonomous, distributed and democratic internet with the highest levels of security, protection of privacy struck a chord with me. I see immense potential for learning with this venture.In the coming days, I aspire to contribute to MaidSafe with adaptive project management, championing continuous improvement through process initiatives, driving collaboration between teams & communities. I am delighted and thankful for this opportunity.New team mate at MaidSafe, Chennai: Vinitha was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


18. 11. 16

Transaction History
Transaction History Market Market Transaction volume Address
HitBTC MAID/ETH 62.11 44,929,588.76 Short cut
Bittrex MAID/BTC 76.61 2,671,174.25 Short cut
BITKER MAID/ETH 187.67 0.00 Short cut
OpenLedger DEX MAID/BTS 93.24 0.00 Short cut
POLONIEX To be provided later To be provided later To be provided later Short cut
Security verification

There is security verification of the project
Why security verification is necessary?

Read more


* Written questions can not be edited.

* The questions will be answered directly by the token team.

Platform ERC20
Hard cap -
Audit -
Stage -
Location -
Market of major crypto coins *2020년 04월 03일 last update



8,619,161.30 KRW 11.98%



178,373.95 KRW 10.76%



223.19 KRW 5.99%



1,235.79 KRW 0.51%

Bitcoin Cash


294,237.84 KRW 11.02%

Bitcoin SV


221,480.16 KRW 11.69%



54,759.09 KRW 0.54%



2,983.88 KRW 10.60%

Binance Coin


16,388.91 KRW 9.35%



2,101.91 KRW 10.24%



63,707.62 KRW 9.95%



52.22 KRW 7.16%



40.07 KRW 8.83%



15.09 KRW 8.81%

Huobi Token


4,377.19 KRW 8.11% Chain


61.50 KRW 7.06%

USD Coin


1,231.91 KRW 0.92%



84,842.84 KRW 8.85%

Ethereum Classic


6,427.35 KRW 5.96%



2,172.55 KRW 11.78%