Back to Course

3. Advanced Course

0% Complete
0/0 Steps
  1. 1. What is Taproot?
  2. 2. Blockchain bridges – what are they?
  3. 3. What is Ethereum Plasma?
  4. 4. What is Ethereum Casper?
  5. 5. What is Zk-SNARK and Zk-STARK? 
  6. 6. What is Selfish Mining? 
  7. 7. What is spoofing in the cryptocurrency market? 
  8. 8. Schnorr signatures - what are they? 
  9. 9. MimbleWimble - what is it? 
  10. 10. What is digital property rights in NFT?
  11. 11. What are ETFs and what role do they play in the cryptocurrency market? 
  12. 12. How to verify a cryptocurrency project – cryptocurrency tokenomics 
  13. 13. What is the 51% attack on blockchain?
  14. 14. What is DAO, and how does it work?
  15. 15. Zero-knowledge proof – a protocol that respects privacy 
  16. 16. What is EOSREX?
  17. 17. What is Proof of Elapsed Time (PoET)?
  18. 18. Mirror Protocol – what it is? 
  19. 19. What are synthetic assets? 
  20. 20. How to create your own NFT? 
  21. 21. Definition of DeFi, and what are its liquidations?
  22. 22. New identity system - Polygon ID
  23. 23. Ethereum Foundation and the Scroll protocol - what is it?
  24. 24. What is Byzantine fault tolerance in blockchain technology?
  25. 25. Scalability of blockchain technology - what is it?
  26. 26. Interchain Security - new Cosmos (ATOM) protocol
  27. 27. Coin Mixing vs. Coin Join - definition, opportunities, and threats
  28. 28. What is Ethereum Virtual Machine (EVM) and how does it work?
  29. 29. Soulbound Tokens - what are they, and how do they work?
  30. 30. Definition of LIDO - what is it?
  31. 31. What are Threshold Signatures, and how do they work?
  32. 32. Blockchain technology and cyberattacks.
  33. 33. Bitcoin script - what it is, and what you should know about it.
  34. 34. What is zkEVM, and what are its basic features?
  35. 35. Do confidential transactions on blockchain exist? What is a Confidential Transaction?
  36. 36. Algorithmic stablecoins - everything you should know about them.
  37. 37. Polygon Zk Rollups ZKP - what should you know about it?
  38. 38. What is Web3 Infura?
  39. 39. Mantle - Ethereum L2 scalability - how does it work?
  40. 40. What is the NEAR Rainbow Bridge?
  41. 41. Liquid Staking Ethereum and LSD tokens. What do you need to know about it?
  42. 42. Top 10 blockchain oracles. How do they work? How do they differ?
  43. 43. What are Web3.js and Ether.js? What are the main differences between them?
  44. 44. What is StarkWare, and recursive validity proofs
  45. 45. Quant Network: scalability of the future
  46. 46. Polygon zkEVM - everything you need to know
  47. 47. What is Optimism (OP), and how do its roll-ups work?
  48. 48. What are RPC nodes, and how do they work?
  49. 49. SEI Network: everything you need to know about the Tier 1 solution for DeFi
  50. 50. Types of Proof-of-Stake Consensus Mechanisms: DPoS, LPoS and BPoS
  51. 51. Bedrock: the epileptic curve that ensures security!
  52. 52. What is Tendermint, and how does it work?
  53. 53. Pantos: how to solve the problem of token transfer between blockchains?
  54. 54. What is asymmetric encryption?
  55. 55. Base-58 Function in Cryptocurrencies
  56. 56. What Is the Nostr Protocol and How Does It Work?
  57. 57. What Is the XDAI Bridge and How Does It Work?
  58. 58. Solidity vs. Rust: What Are the Differences Between These Programming Languages?
  59. 59. What Is a Real-Time Operating System (RTOS)?
  60. 60. What Is the Ethereum Rinkeby Testnet and How Does It Work?
  61. 61. What Is Probabilistic Encryption?
  62. 62. What is a Pinata in Web 3? We explain!
  63. 63. What Is EIP-4337? Will Ethereum Account Abstraction Change Web3 Forever?
  64. 64. What are smart contract audits? Which companies are involved?
  65. 65. How does the AirGapped wallet work?
  66. 66. What is proto-danksharding (EIP-4844) on Ethereum?
  67. 67. What is decentralised storage and how does it work?
  68. 68. How to Recover Cryptocurrencies Sent to the Wrong Address or Network: A Practical Guide
  69. 69. MPC Wallet and Multilateral Computing: Innovative Technology for Privacy and Security
  70. 70. Threshold signature in cryptography: an advanced signing technique!
  71. 71. Vanity address in cryptocurrencies: what is it and what are its characteristics?
  72. 72. Reentrancy Attack on smart contracts: a threat to blockchain security!
  73. 73. Slither: a static analyser for smart contracts!
  74. 74. Sandwich Attack at DeFi: explanation and risks!
  75. 75. Blockchain RPC for Web3: A key technology in the world of decentralized finance!
  76. 76. Re-staking: the benefits of re-posting in staking!
  77. 77. Base: Evolving cryptocurrency transactions with a tier-2 solution from Coinbase
  78. 78. IPFS: A new era of decentralized data storage
  79. 79. Typical vulnerabilities and bridge security in blockchain technology
  80. 80. JumpNet - Ethereum's new sidechain
Lesson 67 of 80
In Progress

67. What is decentralised storage and how does it work?

Decentralised storage is another alternative, to centralised cloud storage. It is where data or files are stored on a decentralised network, in multiple locations, by users or groups of users.

Importantly, the servers used for decentralised storage are hosted by people rather than a single company, making your data even more secure. Anyone can join decentralised storage.

We find more than a dozen reasons why decentralised storagewill replace its centralised form:

  • Data breach problems. Over the past few years, every centralised provider of storage has had a problem with a data breach of their users.
  • Failures and vulnerability to hacking and virus attacks. By storing your files in centralised clouds you expose them to DDoS attacks.
  • Lack of ownership. Don’t kid yourself – once you’ve uploaded data or files to centralised storage, it’s no longer just yours.
  • Censorship and monitoring of the data you share.
  • Rising costs of using centralised storage.

To solve the above problems, an alternative has emerged – decentralised storage.What is it and how does it work? You will find out in our lesson today!

How does decentralised storage work?

In decentralised storage files are stored on multiple computers (nodes). If you need to retrieve a file from such a network, you ask for it. You then retrieve chunks of the file from other participants in the network and end up with the full file.

Decentralised storage appropriately encrypts the file you send so that others cannot read it. Your data and file are secure, inaccessible to third parties. You, as the owner of the file, receive the encryption key, which is a full guarantee that the files are only read by you. What’s more, thanks to sharding (i.e. splitting the file into several parts that are stored on several nodes), no person has the file in question in its entirety. This is an extra layer of protection and security for your data.

What else is worth knowing? Centralised storage stores data at a central point, which is often based on your current location. This causes bandwidth issues – the more users in a location, the lower the bandwidth of the network. This causes data transfer problems. Decentralised storage removes this problem. Peer devices are responsible for distributing and transferring data, independent of the location you are currently in. The result? Higher transfer speeds.

Advantages of decentralised storage

First and foremost, low storage costs. With such a huge number of nodes hosting our data, the amount of storage available to us is much greater. This simultaneously reduces costs, compared to centralised storage.

Greater speed, thanks to the use of P2P, blockchain technology and a central server. Multiple copies are stored on different nodes, and this leads to more copies. The result? Faster downloads.

Security and privacy, thanks to data encryption. Thanks to keys and data fragmentation, no one can access your files. Only you know what you are storing.

Minimal risk of file loss. With hundreds of nodes participating in decentralised storage, copies of the data will still be stored in the event of transmission errors.

Decentralised storage providers

  1. Filecoin. It has gained popularity through the use of IPFS. Filecoin focuses on storing and distributing data, although it is more focused on storing things.
  2. PPIO. The Project is building a decentralised platform for data storage and distribution. The project team is mainly focusing on the application layers, designed for video solutions (video on demand and broadcast).
  3. Tardigrade. A Platform built on Ethereum, designed primarily for data storage. Interestingly, encryption and file sharing lies on the client side.
  4. Swarm. Decentralised storage platform, based on Ethereum Web3.
  5. Sia. Not to be confused with this singer. A platform that wants to provide a backbone storage layer for the internet.

In addition to the above platforms, the decentralised storage industry also includes projects such as Lambda, Genaro, TOP Network, TrustSQl, 0Chain, ThunderChain, ArchonCloud and Internxt.

What stands in the way of mass adoption of decentralised storage?

Trust. Companies, as well as customers, can be distrustful of this form of data and file storage. All because of the lack of liability, in case of data loss.

Performance that will make mass migration of users from centralised storage more difficult.

Service. In order for decentralised storage to be generally accepted, the level of service must be significantly higher than that currently offered by the market.

Summary

Decentralised storageis still developing. It is not yet massively widespread, but it will certainly contribute to the development of Web3. Every user wants a cheaper, more efficient and more secure alternative.

Decentralised storage will solve key issues, but it is still its centralised counterpart that has more supporters.

Complete today’s lesson!

  1. Interoperability in the world of cryptocurrencies and blockchain
  2. What is blockchain and how does it work?