Fact-checked by Grok 2 weeks ago

Tahoe-LAFS

Tahoe-LAFS (Tahoe Least-Authority File Store) is a free and open-source decentralized storage system that enables secure, fault-tolerant file storage by encrypting data client-side and distributing it as erasure-coded shares across multiple untrusted servers. Initiated in 2007 by Zooko Wilcox-O'Hearn and Brian Warner, the project adheres to the principle of least authority, granting storage providers only the minimal capabilities needed for availability while ensuring users retain control over confidentiality and integrity through cryptography. In operation, a client divides a file into shares—typically requiring any 3 out of 10 for reconstruction—allowing tolerance of up to 7 server failures or compromises without data loss, as servers hold no readable data or modification powers. Access control relies on unforgeable capabilities, supporting both read-only and mutable files with granular sharing, thus facilitating distributed backups, collaboration, and resilient archiving without centralized trust. Remaining actively maintained as of its 1.20.0 release in December 2024, Tahoe-LAFS exemplifies provider-independent security in distributed systems, prioritizing empirical resilience over reliance on vendor assurances.

History

Origins and Early Development

Tahoe-LAFS originated in 2006 as an open-source storage backend developed by All My Data, a startup providing online services, to enable secure and fault-tolerant across untrusted servers. The system was designed from first principles to prioritize provider-independent security, employing erasure coding for redundancy, cryptographic hashes for integrity verification, and capability-based access controls to limit authority without relying on centralized trust. , a and expert then working at All My Data, led the initial implementation, drawing on prior experience with decentralized systems like Mojo Nation. The project's first milestone came with the release of version 0.5 on August 17, 2007, marking its transition from internal use to broader availability as Allmydata-Tahoe, with core features including distributed storage grids and basic client-server interactions. Early development emphasized resilience against hardware failures and malicious providers, using Reed-Solomon to split files into shares stored across multiple nodes, ensuring recoverability from partial . Brian Warner contributed significantly to the architecture during this phase, focusing on Python-based implementation and integration with Twisted for asynchronous networking. By 2008, Tahoe had matured enough for public presentation, with Warner detailing its design at , highlighting its use of mutable and immutable file structures to balance performance and security. Wilcox-O'Hearn and Warner co-authored a technical paper that year formalizing the least-authority principles, underscoring the system's resistance to insider threats through encrypted shares and verifiable computation. Development continued actively post-launch, even as All My Data faced financial challenges, culminating in the company's closure in 2009, after which the project rebranded to and shifted fully to community-driven open-source maintenance.

Key Milestones and Releases

Tahoe-LAFS version 1.0 was released on 25 March 2008, providing the initial implementation of its decentralized, erasure-coded storage grid with capabilities for reading and writing files that remain compatible in subsequent versions. Early development traced back to 2006 within All My Data's Tahoe project, emphasizing secure distributed storage, though formal open-source releases began around 2007 under the principle of least authority. Subsequent releases built on this foundation with incremental improvements in reliability, , and . Version 1.6 appeared on 1 February 2010, enhancing and introducing refinements to the storage protocol. Version 1.8.0 followed on 30 September 2010, focusing on and minor protocol updates while retaining file read/write support from prior versions. Later milestones included version 1.10 on 1 May 2013, which added features for improved node discovery and error handling in grids. Version 1.11.0, released 30 March 2016, incorporated usability enhancements and bug fixes for broader deployment. Version 1.14.0 emerged on 21 April 2020, addressing dependency updates and compatibility issues. More recent releases addressed and needs: 1.17.0 on 6 December 2021 resolved vulnerabilities from a Cure53 , added OpenMetrics , and closed 46 tickets since the prior . 1.19.0 was issued on 27 November 2024, followed by 1.20.0 on 18 December 2024, maintaining active support for the 1 series with ongoing compatibility guarantees.

Technical Architecture

Core Components

Tahoe-LAFS operates through a of interconnected , primarily consisting of , clients, and an introducer, which collectively form the foundational for and retrieval. nodes function as user-space processes that hold encrypted shares of files, communicating with other nodes via connections using protocols such as or (the default since version 1.19). Each node maintains a portion of the distributed , with shares typically limited to one per file per node to promote even distribution and resilience against node failures. The introducer serves as a central discovery mechanism, enabling clients and storage nodes to connect and exchange lists of available servers upon startup, thereby establishing a complete "bi-clique" topology where every client knows every storage node. This component, while effective for initial network formation, represents a , though mitigations include support for host mobility and manual reconfiguration. Clients, in contrast, handle file operations such as encoding, uploading, downloading, and repairing data by interacting directly with storage nodes after . At the data abstraction level, core elements include shares—erasure-coded segments of encrypted files (defaulting to 10 shares per file, with 3 required for recovery)—and capabilities, which are unforgeable ASCII strings serving as access keys that encode read-only or read-write permissions along with cryptographic verification data. Capabilities ensure and by binding access rights to hashes and signatures, preventing unauthorized modifications or forgeries. The system is structured in three conceptual layers: the key-value store (handling encrypted, capability-keyed across nodes), the file store (managing directory hierarchies mapping names to capabilities), and the (supporting higher-level uses like backups). Additional supporting components include leases, which govern share retention to facilitate garbage collection, and repair mechanisms that regenerate lost shares from surviving ones. These elements interact such that clients encrypt and encode files before distributing shares via a server selection algorithm based on storage indices, ensuring no single node holds complete file data and maintaining security properties like confidentiality through per-file keys and integrity via cryptographic hashes.

Data Distribution and Erasure Coding

Tahoe-LAFS distributes file data across multiple untrusted storage nodes using erasure coding to ensure and resilience against node failures or data loss. The process begins with client-side encryption of the file using a symmetric key derived from the write , producing that maintains even if individual shares are compromised. This is then ed into smaller blocks—typically on the order of 128 KiB to balance memory usage during coding operations and to enable incremental downloads—before applying erasure coding to each segment independently. Erasure coding in Tahoe-LAFS employs a configurable k-out-of-n scheme implemented via the zfec library, which provides an efficient Reed-Solomon-based mechanism over the GF(2^8) using Cauchy matrices for computational speed. By default, k=3 shares are required for out of n=10 total shares per , allowing tolerance for the loss or of up to 7 shares while incurring a expansion factor of 10/3 ≈ 3.33 times the original size. Each share encodes a of the data blocks, ensuring that any combination of k shares can recover the full through matrix solving, without revealing the content due to prior encryption. The n shares are uploaded to distinct storage nodes, selected deterministically by the client using a selection algorithm driven by a storage index—a of the segment's root cryptographic identifier—to promote even distribution and reduce the risk of correlated outages from colocated failures. If fewer than n nodes are available, shares may be placed on fewer nodes, potentially reducing effective , but the system prioritizes unique placements when possible. Upload success is gauged against a "shares.happy" (configurable, often aligned with n for full reliability), beyond which the file is considered durably stored. For retrieval, the client, holding a read with the necessary decryption key and encoding parameters, queries nodes via the storage index to fetch shares in parallel until k valid shares are obtained, after which decoding reconstructs the segment for reassembly into the full file. This approach supports partial : if fewer than k shares are retrievable, the remains inaccessible, but the decentralized avoids single points of failure. Parameters k and n are user-configurable per upload or grid-wide, allowing trade-offs between , efficiency, and performance; for instance, k=1 with n>1 approximates replication, while higher k values enhance security against Byzantine faults at the cost of increased retrieval latency.

Functionality and Features

Storage and Retrieval Mechanisms

Tahoe-LAFS employs client-side encryption and erasure coding to store files securely across a distributed network of nodes, ensuring confidentiality and availability without relying on server trustworthiness. For immutable files, the client first encrypts the using a symmetric embedded in the read , which also includes such as a root for checks. The encrypted file is segmented into fixed-size blocks, with each segment independently subjected to erasure coding, producing shares that include both and information. By default, Tahoe-LAFS uses a 3-of-10 erasure coding configuration, generating 10 shares from each segment such that any 3 suffice for reconstruction, leveraging systematic codes like Reed-Solomon to tolerate up to 7 failures. These shares are then uploaded to distinct nodes selected by the client, with each share containing encrypted , , and minimal metadata; share placement relies on a —a content-derived used for decentralized discovery rather than centralized indexing. Retrieval of immutable files initiates with the client deriving the storage index from the read and querying known storage nodes to locate shares matching that index. The client fetches a sufficient number of shares (at least the minimum required by the coding parameters), verifies each against hashes in the capability to detect tampering, and applies erasure decoding to reconstruct the original segments from the collected data and parity blocks. Successful decoding yields the encrypted segments, which are decrypted using the capability's key and assembled into the plaintext file, with the enabling efficient partial verification if needed. This process provides verifiable retrieval, as any corruption or alteration in shares fails the checks, prompting the client to seek alternatives from other nodes. For mutable files, Tahoe-LAFS supports two formats: mutable directories (MDIR) and mutable data files (MDMF or newer IMDMF), which use a different mechanism to allow updates without full rewrites. In MDMF, the file is divided into segments with per-segment , erasure-coded similarly to immutables, but includes a signing in the write for authorizing changes; updates involve new share versions with sequence numbers and signatures. Retrieval follows a versioned approach, where the client fetches the latest signed shares via the storage index, reconstructs and verifies the current state, enabling updates while maintaining with immutable semantics through read-write capabilities. This design trades some efficiency for mutability, as frequent changes increase storage overhead due to versioning.

Security and Privacy Mechanisms

Tahoe-LAFS employs a provider-independent security model, where clients perform all critical operations including encryption, erasure coding, and verification, ensuring that storage providers cannot compromise data confidentiality or integrity without possessing the necessary cryptographic capabilities. This design assumes servers may be untrusted or malicious, protecting against threats such as unauthorized reading, tampering, or denial of data through client-side cryptographic guarantees rather than relying on server honesty. The system uses established primitives like AES-128 in CTR mode for symmetric encryption, RSA-2048 for asymmetric operations on mutable files, and SHA-256 for hashing, with security predicated on their computational hardness. Access control is implemented via capability-based mechanisms, where opaque cryptographic strings—known as capabilities (caps)—serve as proofs of for read, write, or operations. For immutable files, a read-cap embeds the symmetric key and a of the , allowing decryption and reconstruction only by holders; write access is impossible post-upload. Mutable files utilize , with read-write caps granting modification rights through private keys, while read-only caps derive from the public key for without alteration. Capabilities can be selectively delegated or diminished (e.g., read-write to read-only), enabling fine-grained sharing without central authentication, though security depends on keeping caps secret and unguessable (typically 96+ bits of ). Integrity is enforced through cryptographic verification at retrieval: clients recompute SHA-256 hashes and structures to detect tampering, rejecting altered shares. Mutable files require digital signatures on updates, preventing unauthorized modifications or rollbacks without the private key. Erasure coding integrates with integrity by allowing reconstruction from any k=3 valid shares out of n=10 distributed ones (default parameters), discarding invalid shares during recovery. This tolerates up to 7 Byzantine faults (e.g., malicious servers providing false data) while maintaining verifiable correctness. Privacy derives from client-side encryption and data dispersion, where files are encrypted with per-file keys before being split into encrypted shares via Reed-Solomon erasure coding and scattered across independent servers, ensuring no single provider holds sufficient shares to reconstruct or access data. This dispersion provides some protection against of individual servers, as an adversary must compromise multiple nodes to obtain a full . However, capabilities may leak such as file sizes or hashes, and the system offers no inherent —server communications reveal IP addresses and access patterns by default, potentially enabling . Convergent encryption is supported optionally for deduplication but introduces risks like inference attacks on file uniqueness, used in fewer than 1% of files due to these concerns.

Variants and Forks

I2P Integration Fork

The I2P integration for Tahoe-LAFS originated from community patches developed around 2010–2011 by contributors including "duck" and "smeghead," who adapted early versions such as 1.6.1 and 1.8.1 to operate over the anonymity network. These modifications enabled Tahoe-LAFS nodes to communicate exclusively via I2P's HTTP proxy (typically at 127.0.0.1:4444) and tunnels, replacing standard connections with I2P server and client tunnels for enhanced privacy against IP-based surveillance. Key changes included configuring tub.location with I2P destinations (e.g., .b32.i2p addresses) and introducer FURIs formatted for I2P, such as pb://[email protected]/introducer. By March 2010, a test grid with 21 nodes—6 storage nodes and 1 introducer—demonstrated viability within I2P. These early efforts constituted a fork, as patches were applied to upstream Tahoe-LAFS code to handle I2P's overlay , which introduces and requires SAM or HTTP bridging for Twisted-based networking. The integration preserved Tahoe-LAFS's core erasure coding and encryption while all inter-node through I2P garlic for sender/receiver , making it suitable for scenarios demanding resistance to . However, I2P's bandwidth constraints and tunnel overhead could reduce throughput compared to clearnet operation, with each node typically requiring multiple inbound/outbound tunnels (e.g., on ports like 3459 or 17337). Subsequent development saw partial upstreaming into mainline Tahoe-LAFS, with configurable support added via options like tub.port = listen:i2p and I2CP settings in tahoe.cfg. Critical to this was a fork of the txi2p library—providing Twisted bindings for —maintained by the Tahoe-LAFS team to resolve Python 3 compatibility issues blocking broader adoption. Released as txi2p-tahoe on PyPI in 2022, this fork ensured ongoing viability for users without dropping support. Public -based grids emerged, with volunteer-run introducers available as of May 2021, facilitating decentralized storage pools hidden within . While effective for privacy-focused deployments, the integration relies on users managing router tunnels, potentially complicating setup for non-experts.

Other Derivatives and Ports

Magic Folder is a extension built atop Tahoe-LAFS, enabling bidirectional syncing of local directories across multiple clients via a Tahoe-LAFS grid for . It detects file changes locally and uploads them as mutable shares to the grid, with handled through versioned directories. Originally integrated into Tahoe-LAFS core, it was separated into an independent project in to allow faster cycles decoupled from the main system. As of 2023, Magic Folder supports convergence for efficient deduplication and optional beyond Tahoe-LAFS's baseline. Tahoe-LAFS Mobile represents a port of core Tahoe-LAFS functionality to platforms, released as a companion app in August 2025. Developed by Least Authority using and Reflex-FRP, it allows reading and traversing directory capabilities (dircaps) and compatibility with Magic Folder formats, though upload capabilities remain under development as of 2024. The app connects to arbitrary Tahoe-LAFS grids via hard-coded server configurations, preserving client-side encryption and verification without server trust. iOS support is planned but not yet implemented. Other extensions include backend adapters for integrating Tahoe-LAFS client security with no-cost public cloud providers, such as a 2023 project providing drivers to store encrypted shares on services like while maintaining provider-independent guarantees. These adapters leverage Tahoe-LAFS's erasure coding and capabilities without altering the core protocol, enabling hybrid deployments. No full ports to alternative programming languages, such as , have been completed, despite community interest in replacing dependencies for performance.

Adoption and Reception

Use Cases and Implementations

Tahoe-LAFS has been employed in decentralized storage grids for fault-tolerant data distribution across multiple nodes, as demonstrated in a 2012 case study using a five-node setup with VirtualBox and Linux guests to showcase object storage capabilities. In community network environments, such as the Guifi.net network in Catalonia, Tahoe-LAFS was deployed over wide-area networks (WANs) in 2015 experiments to evaluate read and write performance on distributed cloud nodes, achieving viable throughput for file storage despite latency challenges inherent to volunteer-run infrastructures. These deployments integrated Tahoe-LAFS with platforms like Community-Lab testbeds, enabling resilient storage for applications in resource-constrained, peer-to-peer settings. Key use cases include secure backup and sharing of sensitive data across untrusted servers, leveraging its and to prevent single points of failure or unauthorized access, as applied in setups for mitigating on remote machines. It supports backend for applications, such as Django-based systems handling large volumes of user-uploaded content on virtual servers with limited local disk space. In anonymity-focused scenarios, Tahoe-LAFS integrates with networks like or for private file hosting and retrieval, aiding users in repressive environments through Open Technology Fund-supported enhancements for secure and management. Experimental implementations extend to hybrid clouds in community networks, where Tahoe-LAFS served as a file storage service alongside video streaming (e.g., PeerStreamer) and platforms (e.g., ThingSpeak) on low-resource devices, demonstrating feasibility for distributed application hosting as of 2016 evaluations. Informal group deployments, such as a 2021 project for WAN-based media file systems among collaborators, highlight its utility in pooling spare storage for shared access without centralized control. Official documentation outlines broader applications like hosting via grids running out-of-the-box web servers to serve immutable files directly from capabilities. Real-world grid operations, discussed in developer mailing lists since 2010, emphasize its role in production-like setups balancing , , and .

Community and Commercial Impact

Tahoe-LAFS maintains an active open-source centered on volunteer contributions, including code patches, documentation enhancements, and bug reports, facilitated through its repository and mailing lists. The project supports financial backing via Open Collective, enabling sustained development by core maintainers and external participants. Community events, such as developer summits in in 2016 and at PyCon in 2020, have fostered collaboration on usability improvements like Gridsync, a graphical client aimed at broader . Security-focused initiatives, including the "Hack Tahoe-LAFS!" contest with prizes for vulnerability discoveries, underscore the emphasis on rigorous auditing and transparency. In community networks, Tahoe-LAFS has seen adoption for decentralized storage, notably in the Guifi.net project, where it serves as the core backend for the Cloudy platform, enabling resilient data sharing among participants despite heterogeneous hardware. Funding from organizations like the has supported enhancements for defenders, including user testing and interface refinements to deploy Tahoe-LAFS in high-risk environments for secure . Similarly, NLnet have advanced integrations like the protocol for production-grade data sharing in privacy-sensitive applications. Commercially, Least Authority, the primary steward of Tahoe-LAFS, leverages the software in offerings like PrivateStorage.io, a privacy-focused service launched in March 2019 in partnership with , which distributes user data across independent providers using Tahoe-LAFS's coding and capability-based access controls. This service has expanded with features such as an mobile app in November 2023 and SFTP integration in September 2025, demonstrating ongoing commercial viability for encrypted, verifiable storage. Evaluations in commercial environments, including deployments on , highlight its performance in hybrid setups, though scalability challenges limit widespread enterprise adoption beyond niche secure storage needs. Sponsors like have contributed to specific releases, aiding reliability improvements without compromising the project's decentralized ethos.

Criticisms and Limitations

Technical Challenges

Tahoe-LAFS encounters performance bottlenecks primarily due to its reliance on erasure coding and cryptographic operations, which expand data by a factor of approximately 3.3 for the default configuration of 3 shares needed out of 10 total shares, significantly slowing uploads compared to downloads, especially on asymmetric connections like where upload bandwidth is limited. Mutable file uploads exacerbate this by requiring the entire to be held in during processing, necessitating at least 1 of memory for files larger than a few gigabytes, alongside computationally intensive key generation for each new mutable . These operations, combined with , create CPU-intensive workloads that hinder throughput, particularly for large files limited by network bandwidth rather than hard caps. Reliability challenges arise from the assumptions underlying erasure coding, which presumes independent failures but often encounters correlated outages or insufficient uptime, leading to high file loss rates—approximately 90% of files on non-commercial grids have become irretrievable due to inadequate share or churn exceeding the . Mutable files (using MDMF or SDMF formats) are particularly vulnerable, lacking the "servers-of-happiness" applied to immutable files, which can result in share concentration on few and heightened risk of data unavailability; past have allowed corrupted shares to propagate failures during downloads. The introducer serves as an initial for grid discovery, though clients can connect directly once established. Scalability issues include potential memory leaks in storage servers correlated with the number of connected peers, complicating large-grid deployments, alongside connectivity limitations from that reduce effective peer reachability as grid size grows. Performance degrades further in anonymized configurations over or , where latency increases due to routing overhead, and remains feasible as file sizes and timing patterns persist post-encryption. These factors contribute to Tahoe-LAFS's suitability for smaller, trusted grids rather than massive, unmonitored deployments without active repair and monitoring mechanisms.

Usability and Accessibility Issues

Tahoe-LAFS relies primarily on a (CLI) for operations such as uploading, retrieving, and managing files, which imposes a steep on users without prior experience in terminal-based tools or distributed systems configuration. This design prioritizes security and flexibility over intuitive interaction, resulting in challenges for non-technical users who must navigate abstract concepts like capabilities, grids, and share placement. Developers have acknowledged these barriers, noting in community discussions that the CLI's complexity discourages broader adoption and necessitates supplementary graphical tools to make the system viable for everyday use. Data retrieval and exhibit high due to the erasure-coding and processes across distributed nodes, making Tahoe-LAFS unsuitable for latency-sensitive applications like or editing, where delays can exceed several seconds even on well-provisioned grids. Performance degrades further with large datasets or under network variability, as clients must reassemble shares from multiple servers, exacerbating for data-hoarding or archival scenarios beyond small-scale secure storage. Setup and maintenance introduce additional hurdles, including configurations, discovery issues, and error-prone repairs for corrupted shares, which require intervention via CLI commands that may not clearly indicate failure modes. Trac tickets highlight persistent problems in error reporting and repair workflows, such as inadequate preservation of during downloads or directory repairs, contributing to user frustration in fault-tolerant operations. Connectivity errors during multi- grids, often stemming from misconfigured ports or daemon modes, compound these issues, particularly in containerized or environments. To address these limitations, companion projects like Gridsync provide a cross-platform frontend that abstracts CLI complexities, offering drag-and-drop and visual status indicators, though it does not fully resolve underlying constraints. Efforts by organizations such as Least Authority have focused on usability enhancements for specific domains, like applications, but core Tahoe-LAFS remains geared toward technically proficient users rather than general .

Recent Developments

Post-2020 Updates

Following the release of version 1.16.0 in 2020, Tahoe-LAFS maintainers issued version 1.17.0 on March 7, 2021, which incorporated fixes for security vulnerabilities identified in a Cure53 audit conducted prior to the release, alongside 46 bug fixes and the addition of OpenMetrics support for monitoring. Subsequent minor releases followed: 1.18.0 on January 9, 2022; 1.19.0 on July 31, 2022; and 1.20.0 on March 5, 2023, with a patch 1.20.1 released the next day to address immediate post-release issues. Development continued incrementally, culminating in the stable release of version 1.20.0 on December 19, 2024, which included updates to the build system and enhancements derived from ongoing resolutions. In September 2025, maintainers resolved #4123 to restore with 3.13 by incorporating the legacy-cgi module, addressing dependencies on deprecated components. These updates primarily focused on maintenance, security hardening, and adaptation to evolving ecosystems, with no major architectural overhauls reported; activity logs show regular commits for defect resolution and improvements through late 2024 and into 2025. The project remains active under the Tahoe-LAFS Software Foundation, emphasizing and least-authority principles without indications of stalled progress or abandonment.

Funding and Future Directions

Tahoe-LAFS has been primarily funded through public donations since its inception, including cryptocurrency contributions such as , which began in August 2010 and initially amassed over 200 BTC across multiple wallet addresses before consolidation into a current address managed transparently via explorers. These funds support operational costs like hosting and SSL certificates, as well as development initiatives including developer contracts estimated at $300,000 to $800,000, summits, and student sponsorships, with expenditures documented and signed in the project's source repository for verification. The Tahoe-LAFS Software Foundation, established to oversee these resources, has aggregated approximately $3.5 million USD in contributions via Open Collective, including a major $2.977 million infusion in October 2023 and recent grants such as $287,692 from Least Authority in February 2025 and $262,795 from Magic Internet in March 2025. Targeted grants have supplemented donations for specific enhancements, such as the Open Technology Fund's support in 2020 for usability improvements aimed at users in repressive environments, conducted through user testing and by Least Authority. Additionally, the NLnet Foundation's NGI Assure Fund provided financing from June 2021 to August 2024 for the project under grant agreement 957073, which Least Authority led to implement an HTTP-based storage replacing the legacy system, thereby reducing complexity, boosting performance, and broadening contributor participation. Future directions emphasize protocol modernization, testing robustness, and grid management scalability, with ongoing work to complete the Great Black Swamp HTTP implementation for functional and performance gains, alongside removing Foolscap dependencies to simplify client-grid communication. The project plans to enhance post-Python 3 migration, improve documentation for user accessibility, and incorporate economic plugins like ZKAP Authorizer , supported by foundation-managed funds allocated to bug bounties, , and potential migration for better automation and process documentation. These efforts aim to sustain Tahoe-LAFS as a secure, decentralized storage solution amid volunteer-driven maintenance and targeted grants prioritizing cryptographic integrity and .

References

  1. [1]
    Tahoe-LAFS
    Tahoe-LAFS is a Free and Open decentralized cloud storage system. It distributes your data across multiple servers.
  2. [2]
    Welcome to Tahoe-LAFS!
    Tahoe-LAFS is a system that helps you to store files. You run a client program on your computer, which talks to one or more storage servers on other computers.
  3. [3]
    Tahoe – The Least-Authority Filesystem - Cryptology ePrint Archive
    Sep 7, 2012 · Tahoe – The Least-Authority Filesystem. Zooko Wilcox-O'Hearn and Brian Warner. Abstract. Tahoe is a system for secure, distributed storage. It ...
  4. [4]
    The Tahoe-LAFS decentralized secure filesystem. - GitHub
    Tahoe-LAFS (Tahoe Least-Authority File Store) is the first free software / open-source storage technology that distributes your data across multiple servers ...
  5. [5]
    [PDF] YOUR CLOUD STORAGE PROVIDER DOESN'T ... - Tahoe-LAFS
    And availability is that you get your data at all, quickly, any time you want it. ... • open-source project started in 2006, as backend for a startup ...Missing: My | Show results with:My
  6. [6]
    [PDF] Tahoe – The Least-Authority Filesystem - Cryptology ePrint Archive
    ABSTRACT. Tahoe is a system for secure, distributed storage. It uses ca- pabilities for access control, cryptography for confidentiality.<|control11|><|separator|>
  7. [7]
    [tahoe-dev] announcing Allmydata-Tahoe v0.5
    Aug 17, 2007 · [tahoe-dev] announcing Allmydata-Tahoe v0.5. zooko zooko at zooko.com. Fri Aug 17 16:15:25 PDT 2007. Previous message: [tahoe-dev] v0.5 ...
  8. [8]
    Tahoe: A Secure Distributed Filesystem
    Mar 1, 2008 · The "Tahoe" project is a distributed filesystem, which safely stores files on multiple machines to protect against hardware failures.
  9. [9]
    Tahoe - The least-authority filesystem - ResearchGate
    Tahoe [Wilcox-O'Hearn and Warner, 2008 ] is a cloud backed file-system running on untrusted clouds. Tahoe error encodes the encrypted data and disperses the ...
  10. [10]
    Hide Cloud Data from the Cloud Vendor - » Linux Magazine
    By contrast, with Tahoe-LAFS operating under the Principle of Least Authority, you only need to trust the provider to give you space. "You're not constrained ...
  11. [11]
    tahoe-lafs - PyPI
    Tahoe-LAFS was first designed in 2007, following the “principle of least authority”, a security best practice requiring system components to only have the ...
  12. [12]
    [tahoe-dev] ANNOUNCING Tahoe, the Least-Authority File System ...
    Feb 1, 2010 · [tahoe-dev] ANNOUNCING Tahoe, the Least-Authority File System, v1.6. Zooko O'Whielacronx zookog at gmail.com. Mon Feb 1 22:10:59 PST 2010.Missing: initial | Show results with:initial<|separator|>
  13. [13]
    [tahoe-dev] ANN: Tahoe-LAFS 1.10 Released!
    May 1, 2013 · [tahoe-dev] ANN: Tahoe-LAFS 1.10 Released! Brian Warner warner at lothar.com. Wed May 1 20:59:02 UTC 2013. Previous message: [tahoe-dev] ...Missing: initial | Show results with:initial
  14. [14]
    ANN: Tahoe-LAFS 1.11.0 released
    Mar 30, 2016 · The Tahoe-LAFS team is pleased to announce version 1.11.0 of Tahoe-LAFS, an extremely reliable decentralized storage system.Missing: initial | Show results with:initial
  15. [15]
    Releases · tahoe-lafs/tahoe-lafs - GitHub
    1.19.0 · Source code (zip). Jan 18, 2024 · Source code (tar.gz). Jan 18, 2024.Missing: v0. | Show results with:v0.
  16. [16]
    Tahoe-LAFS Architecture - Read the Docs
    There are three layers: the key-value store, the file store, and the application. The lowest layer is the key-value store.Missing: core | Show results with:core
  17. [17]
    architecture.rst in trunk/docs - Tahoe-LAFS
    The key-value store is implemented by a grid of Tahoe-LAFS storage servers ... shared+published directory structures can be built from these components.Missing: core | Show results with:core
  18. [18]
    File Encoding — Tahoe-LAFS 1.x documentation - Read the Docs
    It also contains the basic encoding parameters (k and N) and the file size, to make download more efficient (by knowing the number of required shares ahead of ...
  19. [19]
    tahoe-lafs/zfec - an efficient, portable erasure coding tool - GitHub
    The Tahoe-LAFS project uses zfec as part of a complete distributed filesystem with integrated encryption, integrity, remote distribution of the blocks, ...
  20. [20]
    FAQ – Tahoe-LAFS
    Tahoe-LAFS' erasure coding does not have this property, and does not need to have it because we rely on secret-key encryption (using a key in the read cap) for ...<|separator|>
  21. [21]
    Configuring a Tahoe-LAFS node - Read the Docs
    Welcome to Tahoe-LAFS! Installing Tahoe-LAFS · How To Run Tahoe-LAFS; Configuring a Tahoe-LAFS node. Node Types; Overall Node Configuration; Connection ...
  22. [22]
  23. [23]
    [tahoe-dev] short usage report: tahoe-lafs 1.8.1 in I2P
    The users duck and smeghead has done the initial version of tahoe-lafs 1.6.1 for I2P with some patches. After some time it was reported 1.8.1 to be easy to ...
  24. [24]
    Configuring Tahoe-LAFS for I2P
    Sep 18, 2014 · About this document. These instructions are I2P specific. More specifically, these instructions are for duck's modifications to Tahoe-LAFS.Missing: kyt | Show results with:kyt
  25. [25]
  26. [26]
    Using Tahoe-LAFS with an anonymizing network: Tor, I2P
    User does not care to protect their anonymity but they wish to connect to Tahoe-LAFS storage servers which are accessible only via Tor Hidden Services or I2P.Missing: fork | Show results with:fork
  27. [27]
    2889 (i2p options, `tub.port = listen:i2p`) - Tahoe-LAFS
    ​PR 415 adds a --i2p-i2cp-options= flag to the tahoe create-node CLI command, and stores these options in the tahoe.cfg file under [i2p] i2cp.options=, and ...Missing: kyt | Show results with:kyt
  28. [28]
    tahoe-lafs/txi2p: I2P bindings for Twisted. - GitHub
    This is a hopefully temporary fork of txi2p, to help Tahoe-LAFS project to get unstuck in Python 3 porting efforts. travis coveralls. txi2p is a set of I2P ...
  29. [29]
    #3633 (Use forked txi2p) – Tahoe-LAFS
    There are still i2p users of Tahoe-LAFS out there, so we can't drop i2p entirely. ​https://pypi.org/project/txi2p-tahoe/ has a forked release of txi2p, with ...
  30. [30]
    FreshPorts -- devel/py-txi2p-tahoe: I2P bindings for Twisted
    Jun 9, 2022 · This is a fork of txi2p, to help Tahoe-LAFS project to get unstuck in Python 3 porting efforts. txi2p is a set of I2P bindings for Twisted.
  31. [31]
    Tahoe-LAFS introducers for I2P Grid [UPDATED 2021]
    May 17, 2021 · Tahoe-LAFS is a sound distributed file storage software (open-source). There is a public grid run over i2p by volunteers.
  32. [32]
    tahoe-lafs/magic-folder: Tahoe-LAFS-based file synchronization
    Magic Folder for Tahoe-LAFS is a Free and Open file synchronization system. It detects local changes to files and uploads those changes to a Tahoe-LAFS grid.
  33. [33]
    Tahoe-LAFS Magic Folder Frontend
    The Magic Folder frontend synchronizes local directories on two or more clients, using a Tahoe-LAFS grid for storage.
  34. [34]
    #3284 (Remove "magic folder") – Tahoe-LAFS
    The magic folder functionality will be released as a separate project (which depends on Tahoe-LAFS). This will enable an independent development cycle which ...
  35. [35]
    Magic Folder — Magic-Folder 1.x documentation
    Magic Folder is a Tahoe-LAFS front-end that synchronizes local directories on two or more clients. It uses a Tahoe-LAFS grid for storage.
  36. [36]
  37. [37]
    tahoe-lafs-mobile - GitLab
    Apr 4, 2024 · We have milestones and tickets for a rough idea of ... If you want to sign a build with the release key then you need to a signing key.
  38. [38]
    TahoeLAFSMobile – Tahoe-LAFS
    The work on changing that into an app that works with arbitrary grids, also works on iOS and can upload to Tahoe happens ​here (Code repo, milestones, issue ...
  39. [39]
    tahoe-lafs backend drivers for no-cost cloud providers - GitHub
    Nov 5, 2023 · Project aims to provide necessary tools to allow using tahoe-lafs-provided client-side security mechanisms and interfaces with no-cost public ...
  40. [40]
    Tahoe Lafs : r/rust - Reddit
    Feb 24, 2020 · Almost to my bewilderment I learned the Tahoe Lafs distributed filesystem is written in Python. With a major concept here depending on ...
  41. [41]
    A Case Study of an Object Storage Grid Using Tahoe - LAFS | SNIA
    Sep 17, 2012 · The demonstration highlights anchor concepts such as erasure coding, inherent security at any individual node, data availability and overhead ...
  42. [42]
    Tahoe-LAFS Distributed Storage Service in Community Network ...
    We deploy in community networks Tahoe-LAFS, a decentralized storage system with provider-independent security that guarantees privacy to the users.
  43. [43]
    Tahoe-LAFS deployed in the Community-Lab testbed - ResearchGate
    We materialise this framework in the implementation of the Cloudy distribution. We conduct real deployments of these clouds in the Guifi.net community network ...
  44. [44]
    Keep Your Data Private in the Cloud with Tahoe-LAFS | Linode Docs
    Oct 24, 2017 · Tahoe-LAFS keeps your data encrypted, validates at read time that it hasn't been tampered with and keeps redundant copies on multiple ...
  45. [45]
    Tahoe-LAFS: a P2P *filesystem* that lets you use the cloud ... - Reddit
    Feb 10, 2010 · Basically, when you upload a file to Tahoe, it hashes the file based on content and returns a key to you that you can later use to retrieve that ...
  46. [46]
    Tahoe-LAFS 1.x documentation
    Known Issues in Tahoe-LAFS v1.10.3, released 30-Mar-2016 · Known Issues in Tahoe-LAFS v1.9.0, released 31-Oct-2011 · Known Issues in Tahoe-LAFS v1.8.2, released ...
  47. [47]
    Tahoe-LAFS | OTF - Open Technology Fund
    Helping users in repressive contexts better utilize Tahoe-LAFS, an open source, secure option for file storage, sharing, and management.
  48. [48]
    Leveraging deployment models on low-resource devices for cloud ...
    In the experimental system we deploy services such as file storage (Tahoe-LAFS) [2], [3], video streaming (PeerStreamer) [4], [5] and IoT (ThingSpeak)8, as ...
  49. [49]
    [Devember 2021] Distributed WAN filesystem for media (actually ...
    Nov 16, 2021 · Tahoe-LAFS is a distributed storage system that works over the internet. We intend to use it with a group of people to combine spare storage ...<|control11|><|separator|>
  50. [50]
    UseCases - Tahoe-LAFS
    website hosting: One or more grids providing hosting and execution of web applications by means of out-of-the-box web server software to serve files from one or ...Missing: implementations | Show results with:implementations
  51. [51]
    [tahoe-dev] Real-world Tahoe-LAFS grid deployment
    Nov 15, 2010 · [tahoe-dev] Real-world Tahoe-LAFS grid deployment. Brian Warner warner at lothar.com. Mon Nov 15 22:57:22 UTC 2010.
  52. [52]
    Contributing to Tahoe-LAFS - Read the Docs
    As an open source project, Tahoe-LAFS welcomes contributions of many forms. Examples of contributions include: Code patches · Documentation improvements · Bug ...Missing: activity | Show results with:activity
  53. [53]
    Tahoe-LAFS - Open Collective
    Tahoe-LAFS is a free and open, secure, decentralized, fault-tolerant, distributed data store and distributed file system. · Contribute · Financial Contributions.
  54. [54]
    Tahoe-LAFS
    ### Summary of Tahoe-LAFS Community, Adoption, Commercial Use, and Projects
  55. [55]
  56. [56]
    [PDF] Cloud services in the Guifi.net community network
    For this reason, we use Tahoe-LAFS as a main storage service in Cloudy. Under- standing the performance of Tahoe-LAFS from an experimen- tal scenario that ...
  57. [57]
    Project Update: Tahoe-LAFS for Human Rights Defenders
    Aug 27, 2020 · Through user testing and human-centered design, we have been working to improve the open source tools Tahoe-LAFS and Gridsync for anyone to use ...Missing: production | Show results with:production
  58. [58]
    Great Black Swamp - NLnet Foundation
    Tahoe-LAFS is a well-known open source distributed storage solution based on DHT, suited for sharing critical data in production. Currently, Tahoe-LAFS uses ...
  59. [59]
    a secure and privacy-focused cloud storage solution. - Least Authority
    Mar 14, 2019 · The system runs on Tahoe-LAFS, a distributed cloud storage system with a legacy of robust privacy features and ongoing community support. It ...<|separator|>
  60. [60]
    Our mobile application for Android is out! - PrivateStorage
    Nov 2, 2023 · With the ability to access your synchronized folders, you can review important data on the go when you need to. Screenshot of Tahoe-LAFS / ...
  61. [61]
    Enhanced Utility Through SFTP Integration - PrivateStorage
    Sep 10, 2025 · This tutorial walks through enabling the Tahoe-LAFS SFTP frontend, which allows accessing the PrivateStorage grid with many different file ...
  62. [62]
    Performance evaluation of a distributed storage service in ...
    Sep 20, 2015 · For the evaluation of Tahoe-LAFS, a real deployment in the community network cloud was conducted. Experiments assessed the read and write ...
  63. [63]
    #878 (warn users about the performance issues of mutable files ...
    Performance issues: mutable files are stored in their entirety in RAM briefly during upload; creating a new mutable file requires creating a new RSA ...
  64. [64]
    [tahoe-dev] erasure coding makes files more fragile, not less
    Mar 27, 2012 · The idea behind that is that erasure coding lulls people into a false sense of security. If K=N=1, or even if K=1 and N=2 (which is the same ...
  65. [65]
    Known Issues — Tahoe-LAFS 1.x documentation - Read the Docs
    Below is a list of known issues in recent releases of Tahoe-LAFS, and how to manage them. The current version of this file can be found atMissing: commercial | Show results with:commercial
  66. [66]
    [PDF] Analyzing the Tahoe-LAFS filesystem for privacy friendly replication ...
    Section 3 analyzes multiple technologies for file sharing and file synchronization, and tests them individually against a framework that is created based on the ...<|separator|>
  67. [67]
    Custom Query – Tahoe-LAFS
    There may be a memory leak in the tahoe-lafs storage server, which may or may not be related to the number of other storage servers. memory scalability ...
  68. [68]
    gridsync - PyPI
    Unfortunately – and despite all of its technical merits – Tahoe-LAFS has a number of persistent usability issues which steepen its learning curve: its ...
  69. [69]
    Why the Command Line Is Not Usable | by Gus Andrews | Medium
    Apr 8, 2015 · So there's the review. The good news is, it seems like Tahoe-LAFS is in a very good position to build a smart new interface from the ground up.Missing: criticisms | Show results with:criticisms
  70. [70]
    [tahoe-dev] Tahoe-LAFS is widely misunderstood
    Feb 2, 2011 · ... tahoe, and have that interface be sufficiently rich and usable that most people almost never want to use the CLI, and *never* want to use ...<|control11|><|separator|>
  71. [71]
    Using Tahoe-LAFS for data hoarding? : r/DataHoarder - Reddit
    Oct 30, 2018 · I have used it. It's great for small amounts of data that you need to secure. But it's performance is pretty bad when accessing data ...Missing: usability | Show results with:usability
  72. [72]
    Custom Query (205 matches) - Tahoe-LAFS
    Results (1 - 100 of 205) ; #579 · report corrupted shares, error usability preservation download repair anti-censorship ; #625 · Can't repair read-only dirnodes/ ...
  73. [73]
    Getting docker working in daemon mode for a tahoe-lafs storage ...
    Dec 11, 2014 · The doubling of the ports (in:out) is needed because specifying only one will map that port to a random high numbered port in the container.Missing: implementations | Show results with:implementations
  74. [74]
    1891 (Setup Problem) - Tahoe-LAFS
    Could there be a firewall or other connectivity issue preventing the machines from connecting to each other? What operating system are you using? comment:3 in ...<|separator|>
  75. [75]
    Community Matters - Least Authority
    The HRO Cloud is built on Tahoe-LAFS, an open-source, decentralized cloud storage system which distributes data across multiple servers. Using Tahoe-LAFS ...
  76. [76]
    tahoe-lafs
    ### Release History After 2020
  77. [77]
    Timeline - Tahoe-LAFS
    Timeline. View changes from and days back done by. Repository changesets. Milestones reached. Tickets opened and closed. Ticket updates. Wiki changes. Note: See ...
  78. [78]
    WeeklyMeeting – Tahoe-LAFS
    turns these notes into the Tahoe Weekly News. Other resources that usually get referenced during the course of the meeting: ​https://tahoe-lafs.org/trac/tahoe ...
  79. [79]
    How one free software project gained, lost, and found ... - Ars Technica
    Apr 5, 2016 · Tahoe-LAFS ("Least-Authority File Store") is a mature free software project that builds and maintains a zero-knowledge decentralised cloud storage system.
  80. [80]
    Donations — Tahoe-LAFS 1.x documentation
    For each declared budget item, we will allocate a new public key, and transfer funds to that specific key before distributing them to the ultimate recipient.
  81. [81]
    The Tahoe-LAFS Software Foundation - Open Collective
    Contributions ; Tahoe-LAFS. Collective · October 2023 · $2,977,001 ; Magic Internet. Project · March 2025 · $262,795 ; Least Authority. Project · February 2025.
  82. [82]
    Roadmap - Tahoe-LAFS
    Roadmap · Milestone: soon · Milestone: Migrate to GitLab · Milestone: Append-only Feature · Milestone: Automate Release Process · Milestone: Contributor Experience.