The MaidSafe Platform

The MaidSafe Platform provides a distributed network that allows companies and individuals to create fast, secure applications that can manipulate data of all kinds, share applications, data and communications between individuals, groups or entirely publicly.

The MaidSafe vision is to replace today's existing server centric and intrusive systems with a fully distributed, safe, secure and private network for all of the people of the world. A network with no third party being able to intercept, copy, steal, sell or otherwise access the people's data, a network where the only person that could ever access your data, is you! It is our intention that the MaidSafe Platform will become the people's network!

No Servers

  • No servers = no data centres
  • 100% server security (there are no servers)
  • Impervious to web censoring (no DNS)
  • Denial of Service attacks rendered invalid via opportunistic caching - See diagram
  • Unlimited data storage with no monetary cost and no transactions

No Administrators - Only Users

  • Network automatically configures and reconfigures in near real time
  • Privacy and data protection via thousands of algorithms on hundreds of nodes working in tandem
  • Network decides in real time where data is stored
  • Data caches close to users in real time
  • Remove need for network provisioning and planning (hint, computers are better at this than us)
  • No data centres, so no data centre staff

Data Management Security

  • Invisible to users, all data is encrypted in real time
  • Real time data de-duplication, reduces amount of data stored
  • Real time replication, recovery and corruption repair
  • Geographic distribution of 'replicant' data (allowing mass network outage at zero loss)
  • Cryptographically secure signatures and key's ensure ownership
  • Nobody has access to anyone else's data unless specifically shared

Password and Key Security

  • 100% protection against passwords being stolen in transit (they are never transmitted)
  • Three (minimum) distinct system areas with separate keys and IDs (no network link between them)
  • Login to system with username, pin and password
  • Store, retrieve and manipulate your data with another ID (cryptographic key set)
  • Communicate with others through another ID
  • For every private share, another key chain is created and shared

Share any Kind of Data

  • Create private shares between friends and colleagues (instantly and securely)
  • Create any number of public shares for public data (thin web sites)
  • Create micro-blogging systems
  • Create social networking systems
  • Share anything, music, programmes, photos, even operating systems with no size limits

Distribute Applications

  • Allow enormous apps on the smallest of devices
  • Share processing, storage and memory across the network, distributing each of them automatically
  • Structured data versioning allows roll back, automatic and manual merging as appropriate to your application