IPDW - InterPlanetary Data Wallet

Introduction to HUDI's InterPlanetary Data Wallet (IPDW).

Explore the IPDW, a groundbreaking tool for storing user data within a secure, distributed storage network. This section covers decentralized authentication, the principles of the Data Wallet, and the technical architecture behind building a fully decentralized network without centralized databases.

InterPlanetary Data Wallet (IPDW): store users data within a secure distributed storage. It enables to build a real decentralised network (Web 0) without the need of centralized database. You can take advantage of P2P interactions, database-less, conflict-free replication, and much more. The main idea is to shard data structures in blocks and to propagate them encrypted and signed.

Original implementation in Typescript/Javascript with support to Browser and Node.js environments:

Features

  • Store unstructured data

  • Authenticate with web3 keys

  • Enjoy p2p interactions

  • Deploy database-less apps

  • Unlimited scalability

  • Conflict-free

  • And much more!

Decentralized authentication

Everyone has a key pair, consisting of a public key and a private key, which can be saved in different formats (such as the BIP39 standard for mnemonic phrases-based deterministic key generation).

In Web 3.0 applications, your wallet address (derived from the public key) can be recognized, allowing you to act on the distributed ledger (the storage) as a well-identified identity.

Data Wallet Principles

The InterPlanetary Data Wallet is a sophisticated mechanism for storing all kinds of data that works offline and only partially exposes the data during a transaction. The data is encrypted, so it can be safely shared without knowing the passphrase.

The wallet can be synced between all your devices using P2P communication strategies like IPFS and IPNS, and is always offline until a transaction occurs.

Security and Design

The blockchains have different replicated and redundant ledgers and consensus algorithms, with a competition underway to find the best algorithm for increased throughput, security, and more.

Thanks to applications like Metamask/Trust, Web 3.0 users are now familiar with private key usage and management. These applications have simplified the user experience, making it easy for users to manage keys and sign messages using ECDSA.

Private keys and public keys are nearly invulnerable to attacks from computers, except for social/phishing and similar attacks. "Humans are always the vulnerable element in the chain," so it's important to always be cautious.

Last updated