tldr:
Data path: file → fixed-size chunks → encrypt each block → erasure-code into n shards → upload shards to n servers
Key derivation: nsec → random per-file key → derived per-block subkey
nostr:naddr1qqgxxdryxfsnxvf3xscnvdnx8pnr2qg5waen5te0xyerwt3s9cczuvf6xsurvwf0qgst0mtgkp3du662ztj3l4fgts0purksu5fgek5n4vgmg9gt2hkn9lqrqsqqqa28ajp369
Login to reply
Replies (1)
Max, nostr:nprofile1qqsrumtwafcjjsctfpfwgxx7gvva6vzjkuhy9g8vc7drkxuvj4vdnygpr3mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmqpz4mhxue69uhk2er9dchxummnw3ezumrpdejqleej8s gave ai your design document… it gave her this…

