Select Page
Devcon.buzz: Revolutionizing Communication with Anonymous Chatting on Swarm

Devcon.buzz: Revolutionizing Communication with Anonymous Chatting on Swarm

Devcon7, a landmark gathering for developers from across the globe, is set to witness a seismic shift in how attendees connect and communicate. Amidst growing concerns about data privacy and centralized control, Solar Punk, a visionary tech collective, has stepped up to answer the call with a groundbreaking new app, Devcon.buzz.

Devcon7 and it’s audience

Devcon is a biannual conference that brings together Ethereum developers and enthusiasts to explore the latest advancements and future potential of blockchain technology. This community is acutely aware of the risks posed by centralized platforms that collect, store, and often exploit user data— a reality underscored by recent issues with once-trusted social platforms. The audience longs for a communication platform where they can freely exchange ideas and collaborate without sacrificing their privacy.

Devcon.buzz: the power of anonymous chatting

Anonymous chatting offers a solution to this pressing need. It empowers users to engage in open and honest discussions without fear of having their personal information tracked or misused. This feature resonates deeply with the Devcon7 vision of fostering a secure, unstoppable, and censorship-free space for brainstorming, problem-solving, and knowledge-sharing.

Solar Punk’s solution

Solar Punk’s app, built on the decentralized architecture of Swarm, revolutionizes communication at Devcon7. It leverages Swarm’s robust capabilities to provide a secure and private platform for real-time chatting, with all components fully decentralized.

The app streamlines the Devcon experience by:

  • Providing a comprehensive conference agenda: Attendees can stay organized and up-to-date with sessions and events.
  • Organizing discussions by agenda topics: This helps users to easily connect with like-minded individuals and engage in relevant conversations.
  • Facilitating anonymous chatting: Users can freely express  ideas without compromising their privacy.
  • Rewarding active participation: Encouraging users to  explore Swarm’s features and contribute to the network’s growth.

The impact

This app demonstrates the potential of Swarm to revolutionize real-time communication in a truly decentralized manner. By empowering Devcon7 attendees to connect and collaborate anonymously, Solar Punk has not only addressed a major concern of the Devcon7 audience but also set a new standard for data privacy in the digital age.

The combination of the app’s features and the decentralized nature of Swarm creates a unique and powerful communication tool for Devcon7 attendees. It fosters a sense of community and encourages open dialogue while ensuring that users retain control of their privacy.

Join the conversation at Devcon7 and experience the future of communication on Swarm with Devcon.buzz!

Introducing the Access Control Trie (ACT) in Swarm

Introducing the Access Control Trie (ACT) in Swarm

by András Arányi

The Access Control Trie (ACT) is an essential feature designed to manage access control in Swarm’s decentralized storage infrastructure. It enables publishers to grant or revoke access to specific content at the chunk level using encrypted session keys. This guide will walk you through the key concepts and practical aspects of using ACT to protect your data in Swarm.

If you’re a content publisher and looking for a way to share data but maintain full control and privacy, you might find that the below concept of a fully fledged access control mechanism covers all your needs.

Content Publishers

⚠️ TLDR: Publishers can control access to their data by encrypting access keys for each viewer and adding/removing them from the ACT lookup table. ⚠️

As a publisher, you have full control over who can view your content. Using ACT, you can upload your data and grant access to specific grantees (viewers) by referring to their Swarm node wallets’ public keys. Additionally, you can revoke access at any time, ensuring that only authorized viewers have the ability to access your data.

What makes ACT unique is that, as opposed to other solutions which only encrypt data, ACT ensures that only the intended viewers will have access to the data. Everyone else is blocked, even from discovering an encrypted version of it. This significantly increases the privacy and security of your content, preventing unauthorized users from knowing the data even exists.

How to manage access:

  1. Upload your content to Swarm as you normally would, but with ACT request headers included.
  2. Assign access rights by adding the grantee’s public key to the ACT.
  3. If needed, revoke access by removing the grantee from the ACT.

Keep in mind: Publishers can control the latest version of content that grantees are able to access. If you update your content, viewers might still have access to an older version if they were granted access to that earlier version before.

You can learn more about how to manage access using tools like swarm-cli by following the tutorial in the Swarm documentation. These features are also fully supported by the Bee API (starting from version 7.0+), enabling any application to interact with them directly.

Grantees (Content Viewers)

⚠️ TLDR: Grantees can access the specific version of content that the publisher has granted access to, but may lose access to future versions if revoked. ⚠️

As a grantee, your ability to view the content is based on the public key of your Swarm node’s wallet and depends on the permission granted by the publisher. The process for gaining access is simple and secure, thanks to ACT’s encryption mechanisms.

How it works:

  • Your Swarm node wallet’s public key is used as a session key, which is then used to create two additional keys:
    • A lookup key to find your entry in the ACT lookup table.
    • An access key decryption key, allowing you to decrypt the content access key specifically encrypted for you.

This ensures that only you can decrypt the content, and you can retrieve the version of the content you have (or have had) permission for.

How ACT Manages Grantee Access

ACT employs a sophisticated mechanism to manage grantee access using public-key cryptography and secure key derivation. At the heart of this system is the ACT lookup table, a key-value store that securely links each grantee’s Swarm node wallet’s public key to an encrypted access key. Here’s a breakdown of how it works:

  1. Session Key:
    Each grantee’s Swarm node’s public and private key pair serves as their unique session key. This session key is crucial because it forms the basis for all further encryption steps related to the grantee’s access.
  2. Key Derivation via Diffie-Hellman:
    Using Diffie-Hellman key derivation, the session key is used to derive two important keys:
    • Lookup Key: This key is used to identify the specific entry for a grantee in the ACT lookup table.
    • Access Key Decryption Key: This key is used to decrypt the access key, which in turn allows the grantee to unlock the protected content.
  3. Encrypted Access Keys:
    The content access key is encrypted specifically for each grantee using their derived decryption key. This ensures that only the intended grantee can decrypt the access key and thus view the content. This per-grantee encryption adds a layer of security, preventing unauthorized access even if someone else obtains the encrypted data.
  4. ACT Lookup Table:
    The lookup table itself is implemented as a key-value store within a Swarm manifest. Each grantee’s public key maps to an encrypted access key, ensuring that only authorized users with the correct session and decryption keys can retrieve the access key and, subsequently, the content. This table allows publishers to manage access dynamically, adding or removing grantees as needed without compromising the security of the stored content.
  5. Adding and Removing Grantees:
    Publishers have the flexibility to dynamically add or remove grantees from the lookup table. When a grantee is added, their public key and the corresponding encrypted access key are stored in the lookup table.

Version Control and Historical Access:
The ACT maintains a version history, which includes timestamps for each version of the access control list. If a grantee’s access is revoked for new versions of the content, they can still access older versions to which they had been granted permission, based on the relevant timestamps.

Encryption and Security in ACT

⚠️ TLDR: Every element in the ACT process is encrypted, ensuring complete security of content and access control. ⚠️

As demonstrated earlier, encryption is central to how ACT is implemented. Every component, from the grantee list to the content access keys, is encrypted using strong cryptographic methods. This ensures that only authorized users can access your data, and any tampering or unauthorized access is effectively prevented.

Here’s how encryption is applied:

  • Grantee List Encryption:
    The list of grantees is encrypted using the publisher’s lookup key, ensuring that unauthorized users cannot even detect the existence of the grantee list. This adds another layer of privacy, as only the publisher and authorized grantees are aware of who has access.
  • Access Key Encryption:
    Each grantee’s access key is individually encrypted using their specific decryption key derived through the Diffie-Hellman process. This ensures that only the intended grantee can decrypt the access key and gain access to the protected content.
  • Historical Version Encryption:
    All versions of the ACT, including older ones, are protected by encryption. This means that even if a grantee’s access is revoked, the historical data they had access to remains encrypted and secure.

Content Encryption:
Finally, the actual content itself is encrypted at the chunk level. Only those who possess the correct access key (which is encrypted for each grantee) can decrypt and retrieve the content.

Key Takeaways

  • Publishers: Maintain control over your data and manage grantee access with fine-grained control using ACT. You can easily add or remove access rights and ensure your data is always protected by encryption.
  • Grantees: Access specific versions of content securely, knowing that only you have the ability to decrypt the content you’ve been granted access to.

For anyone operating in the Swarm ecosystem, the Access Control Trie (ACT) represents a critical advancement in decentralized content management, offering robust security while maintaining flexibility in access control.

If you’re interested in learning more about how ACT works or how to implement it in your Swarm nodes, have a look at the Swarm documentation.

ACT opens up endless possibilities in new type of business applications on decentralised infrastructures. If you want to know how or you already have a concept in mind have a look at our article dedicated to this topic and register your interest in a consultation with us here/

Mastering Digital Sovereignty: Unlocking the Power of Decentralised Data

Mastering Digital Sovereignty: Unlocking the Power of Decentralised Data


A Paradigm Shift in the Digital World

In the rapidly evolving landscape of blockchain technology, a new narrative is unfolding – one where decentralised data stands as a cornerstone, akin to the groundbreaking emergence of Bitcoin and Ethereum. Today, our digital existence, encapsulated in browser history and sensitive information, is often exploited. This exploitation, largely unseen, leads to significant and sometimes alarming consequences.

Reclaiming Control: The Essence of Digital Sovereignty

The rise of digital interactions has paradoxically led to a loss of control over our digital identities. This trend highlights the urgent need for heightened awareness and protection of our online data. High-profile data breaches, like MGM’s and recent cybersecurity incidents involving major crypto platforms, have laid bare the vulnerabilities inherent in centralised systems.

Decentralisation vs. Digital Sovereignty: Understanding the Difference

While these terms are often used interchangeably, they encapsulate different aspects of online autonomy. Digital sovereignty is about controlling and owning your online identity, leveraging tools that ensure self-governance of personal data. Decentralisation, on the other hand, is the architectural distribution of control, aimed at reducing dependency on single entities and creating a more resilient digital ecosystem.

The Role of Decentralised Data in Empowering Users

Decentralised data is not just about the technical redistribution of control; it’s about crafting a digital landscape where users can assert their sovereignty. By adopting decentralised structures, like those found in blockchain technology, users gain more autonomy over their digital interactions, ensuring that their data remains secure, private, and within their control.

Embrace the Digital Sovereignty Movement

As we step into this new era, the call to embrace digital sovereignty grows louder. It’s no longer sufficient to be passive participants in the digital realm. Instead, we must actively engage with technologies that empower us, ensuring that our digital trails are not exploited but protected. Decentralised data offers a path to this future, one where each individual’s digital identity is safeguarded and respected.


The Journey Toward a Sovereign Digital Identity: Embracing Ethereum Swarm with Solar Punk’s Expertise

As we journey toward a future underpinned by digital sovereignty, the role of decentralised data becomes increasingly crucial. Ethereum Swarm emerges as a pivotal technology in this landscape, offering a robust platform for creating fully decentralised applications. This technology not only ensures data security and privacy but also aligns with the ethos of a decentralised, user-empowered digital world.

For those looking to harness the full potential of decentralised data in their dApp development, Solar Punk is here to guide and assist. Our expertise in building on Ethereum Swarm enables us to help you create dApps that are not just technologically advanced but also deeply committed to the principles of digital sovereignty and user autonomy.

We encourage you to explore the possibilities that Ethereum Swarm offers. If you’re ready to embark on this path and want your project to stand at the forefront of digital innovation, reach out to us here. Together, we can build a future where digital ownership and creativity are fully harnessed through the power of decentralised data.