You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long. 3.8KB


ida:// Douglass Decentralized Protocol

The Ida protocol is named in honor of Ida B. Wells an African American teacher, journalist, civil rights pioneer and suffragist .

ida: is the decentralized protocol that powers the Douglass OS and the Douglass Browser

The Ida protocol provides: Decentralized distributed secure semantically enhanced file sharing with dynamic versioning.

When files are added to the Ida protocol and shared with anyone in the Douglass community all versions of the files are saved and are accessible to any member of the network that has been granted permission to access the files.

All files and data that are added to the Ida protocol are semantically tagged and added to a distributed data graph.

With Ida and the Douglass OS you can Build and host decentralized and semantically enhanced web sites and apps with no ISP and no Blockchain.

Ida Features:

  • Ida’s unique decentralized network protocol allows communities to: share, store, and distribute data where and when they want.

  • Decentralized Redundancy - Ida is a Decentralized protocol that is designed to distribute datasets in a swarm of nodes using semantic context vector mapping.

  • When a node acquires their first piece of data in a dataset, the node can choose to become a mirror for that dataset.

  • When other nodes make request for a file or dataset; the node with the initial piece can choose to share it.

  • Dataset /file distribution and sharing happens simultaneously while a node is still downloading the pieces they want from other nodes.

  • Ida reduces bandwidth costs as files and data become more popular, downloads are distributed across all available nodes.

  • By decentralizing storage and distribution, Ida also increases speeds by downloading from many nodes at the same time.

  • Ida transfers files using state-of-the-art cryptography. Only users with your unique cryptographic key can access your files. Ida verifies the hashes of content on download, so malicious content cannot be added.

  • With Ida user privacy comes first. Services and Applications using the Ida Protocol have encrypted transfer, private data sharing, and content verification built-in.

  • Decentralized Network Privacy - Ida guarantees end-to-end encryption of all shared content.

  • When Ida sends data to a clusters of nodes all of the data is synced within the clusters at the same time. Ida’s distributed syncing allows for robust dynamic global archiving.

  • Shared Datasets are algorithmically discovered via context vector mapping. This enables the exchange of semantic data in a swarm of nodes.

  • Ida uses distributed append-only registers to store dynamic version history.

  • Ida mirrors the state of a node and all of it’s contents. When files are added to a node Ida adds semantic mapping data and also grabs the filesystem metadata and checks if there is an existing entry for this filename on the network.

  • Ida automatically maintains and updates built in version history and context vector maps whenever files are added to the network. This gives Ida the ability to facilitate partial downloads of content, only downloading the latest content from the network.

  • Progressive Versioning - Ida enabled datasets can be synced in real time to multiple nodes in the network.

  • Datasets and Applications are secured with cryptography.

  • The Ida protocols Decentralized Redundancy gives the ability to transfer large amounts of secure data at scale.

  • With Progressive Versioning, Ida guarantees that every node hosting Ida content has real time dynamically updated versions.