¨All connections encrypted
SSH or OpenSSL layer handling; undecided
¨Clients must authenticate via public key
It is assumed that there will be well-known anonymous authenticators
¨Entities are named by cryptographic hash of their
content.
These can only be obtained starting from a project or
branch.
Access to project/branch is authenticated based on
authentication key
Note client side can test corruption
¨Untrusted servers are given public access, and
therefore can replicate only public
objects.
Note hybrid security model here!