All language subtitles for 001 What is IPFS and How It Works

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt-PT Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese Download
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,260 --> 00:00:08,610 The interplanetary file system, or IP office, is a protocol designed to create a permanent and decentralized 2 00:00:08,610 --> 00:00:10,990 method of storing and checking files. 3 00:00:11,610 --> 00:00:19,680 It is based on BitTorrent NGet index, used mainly for saving and delivering static content such as 4 00:00:19,680 --> 00:00:23,040 images, videos, documents and so on. 5 00:00:23,840 --> 00:00:31,230 Typeface, if built right, could complement or even replace ETP and build a better web. 6 00:00:31,860 --> 00:00:34,370 Let's take a look at these characteristics. 7 00:00:34,980 --> 00:00:41,400 First, you should know that the machine that runs IPIS software to store and retrieve files from the 8 00:00:41,470 --> 00:00:49,620 APS network is called an IP address, not IP office is a peer-to-peer, decentralized and distributed 9 00:00:49,620 --> 00:00:58,230 file system is a file system because it has directories and files that can be mounted expert appear 10 00:00:58,440 --> 00:01:02,610 because there is no central server or single point of failure. 11 00:01:03,300 --> 00:01:10,620 It uses a completely decentralized architecture for worldwide peer-to-peer file transfers. 12 00:01:12,190 --> 00:01:21,490 IP office is a medium or content delivery network, once someone it's a file to the AP office locally, 13 00:01:21,790 --> 00:01:29,440 the file will be available to the world immediately excursion friendly and uses the BitTorrent bandwidth 14 00:01:29,440 --> 00:01:30,280 distribution. 15 00:01:30,850 --> 00:01:35,530 IP office is also fault tolerant with zero downtime. 16 00:01:36,340 --> 00:01:44,230 Once a file is added to an IP address node and requested by IP office clients, the file gets cached 17 00:01:44,380 --> 00:01:48,670 by other networks as well, making it impossible to remove it. 18 00:01:49,120 --> 00:01:56,280 So even if the originating node removes the file, the file will still exist on other networks. 19 00:01:56,800 --> 00:02:02,080 Another characteristic is that IP office is censorship resistant. 20 00:02:02,410 --> 00:02:04,060 It's like a permanent web. 21 00:02:04,390 --> 00:02:11,039 Once a file was edited and kicked on the IP network, it cannot be deleted anymore. 22 00:02:11,980 --> 00:02:19,480 It was shanked in blocks and already saved on tens of pigs that cannot be forced to remove the file. 23 00:02:20,050 --> 00:02:30,020 For example, digging the block of Wikipedia in Turkey between 2017 and 2020, IP face was used to create 24 00:02:30,040 --> 00:02:36,970 a mirror of Wikipedia, which allowed access to the content of Wikipedia despite the ban. 25 00:02:37,600 --> 00:02:41,550 Of course, this comes with some legal issues as well. 26 00:02:41,920 --> 00:02:46,000 No authority can force the network to remove a pirated file. 27 00:02:47,240 --> 00:02:54,470 Now that we've talked about the basic characteristics of IPIS, let's move on and talk about content 28 00:02:54,470 --> 00:03:01,430 addressing that is used by typeface versus location, addressing that is used by the traditional web. 29 00:03:02,300 --> 00:03:09,380 Instead of referring to Phylis by location or which server they are stored on IPA, Facer refers to 30 00:03:09,380 --> 00:03:13,140 everything Behesht meaning the content itself. 31 00:03:13,790 --> 00:03:18,070 It works by taking a file and hashing it cryptographically. 32 00:03:18,320 --> 00:03:26,510 So you end up with the unique hash of the file, which ensures that no one can create another file that 33 00:03:26,510 --> 00:03:27,530 has the same hash. 34 00:03:27,920 --> 00:03:31,110 And this hash is the address of the file. 35 00:03:31,730 --> 00:03:38,570 So instead of talking to a server, we are talking to a specific piece of data and no one is really 36 00:03:38,570 --> 00:03:41,300 interested in where the data is located. 37 00:03:42,830 --> 00:03:51,500 Let's dive deeper into this and see an example I a file to the AP office network to do that, I'll run 38 00:03:51,500 --> 00:03:57,620 some comments, but don't focus on them because we'll have plenty of time to test the comments in the 39 00:03:57,620 --> 00:03:58,490 next lecture. 40 00:03:58,880 --> 00:04:02,900 Just focus on the concepts in the current directory. 41 00:04:03,130 --> 00:04:09,980 There is a file called Typeface that the and I'm going to add this file to the AP office network. 42 00:04:10,590 --> 00:04:13,850 So I'm running through the typeface and in the name of the file. 43 00:04:16,540 --> 00:04:25,090 Take a look at this piece of hash, it uniquely identifies the files in the first network and to access 44 00:04:25,090 --> 00:04:27,930 the file, all we need is this hash. 45 00:04:28,420 --> 00:04:31,960 We don't need the address of the machine that starts it. 46 00:04:32,800 --> 00:04:40,180 What happened behind the scenes after Arenda comment is that the file was chunked in blocks, saved 47 00:04:40,180 --> 00:04:48,280 locally in a folder, and will stay there until an IP based gateway will request the file by its content 48 00:04:48,280 --> 00:04:53,110 identifier, which is the hash after the file was requested. 49 00:04:53,320 --> 00:05:00,880 It will be saved in the gateways cache and be available to the whole world even if I shut down my machine. 50 00:05:01,860 --> 00:05:09,380 When someone wants to access a particular page using the browser IP address will ask the entire network, 51 00:05:09,720 --> 00:05:18,150 does anyone have the data that corresponds to this hash and node on typeface that contains the corresponding 52 00:05:18,150 --> 00:05:25,530 hash will return the data allowing you to access it from anywhere and potentially even offline because 53 00:05:25,530 --> 00:05:27,360 it was already cached locally. 54 00:05:27,750 --> 00:05:28,980 This is really smart. 55 00:05:29,850 --> 00:05:32,510 Using the browser on another machine. 56 00:05:32,700 --> 00:05:34,170 I'll request the file. 57 00:05:35,010 --> 00:05:43,830 So I'm writing IP address about how this is the main IP office gateway slash IP address and the hash 58 00:05:43,830 --> 00:05:44,440 of the file. 59 00:05:44,640 --> 00:05:47,460 So I'm going to copy the hash to ClipArt. 60 00:05:51,180 --> 00:05:55,330 And I'm pasting the hash here, so slash and the hash. 61 00:06:01,190 --> 00:06:02,750 And it was delivered. 62 00:06:03,050 --> 00:06:04,550 This is the first contents. 63 00:06:08,010 --> 00:06:17,480 Now I'm copying the same file to a Web server I control and I'm going to use SICP, so SFP the part 64 00:06:17,490 --> 00:06:25,050 on which SSX license two two nine nine, the source file typeface. 65 00:06:25,590 --> 00:06:33,840 I'm authenticating using the IP address of the server and I'm going to copy the file to the document 66 00:06:33,840 --> 00:06:35,760 code of the Apache Web server. 67 00:06:35,760 --> 00:06:40,560 So enslaver w w w slash ASML. 68 00:06:42,960 --> 00:06:44,160 And the file is copied. 69 00:06:45,260 --> 00:06:49,520 The access to the server was already configured in advance. 70 00:06:50,890 --> 00:06:58,840 And I'm accessing the file using HTP and its location, so the servers IP address, I'm pasting the 71 00:06:58,840 --> 00:07:03,970 address in the name of the IP address that not in the file was delivered. 72 00:07:04,780 --> 00:07:09,520 Now, if I shut down the server, no one will be able to get to the file again. 73 00:07:09,910 --> 00:07:12,430 So I'm shutting down the server. 74 00:07:12,490 --> 00:07:15,740 This is the server Environics system still. 75 00:07:15,880 --> 00:07:16,980 I mean, look at it. 76 00:07:17,440 --> 00:07:18,290 Step up. 77 00:07:18,330 --> 00:07:18,790 Fix it. 78 00:07:20,910 --> 00:07:25,170 So the Web server was stopped and I'm refreshing the page. 79 00:07:27,130 --> 00:07:28,560 And it's not working. 80 00:07:29,720 --> 00:07:31,240 The site cannot be reached. 81 00:07:32,810 --> 00:07:39,740 So whoever controls the location controls the content, the administrator of the location can dictate 82 00:07:39,740 --> 00:07:46,400 who is allowed to access that information, can move the information without telling anyone, can destroy 83 00:07:46,400 --> 00:07:54,170 the information, can collect data about anyone that accesses the information and can replace the information. 84 00:07:54,530 --> 00:07:58,590 So HTP and ETPs are location based. 85 00:07:59,330 --> 00:08:07,040 But if I shut down the first Dhiman, the file is still available on many other IP address nodes and 86 00:08:07,040 --> 00:08:10,330 can be requested by anyone interested in it. 87 00:08:11,150 --> 00:08:14,720 So I'm shutting down the IP office deman. 88 00:08:15,740 --> 00:08:17,530 I'm pressing controversy. 89 00:08:18,540 --> 00:08:22,620 And the demon was stopped and I'm requesting the file. 90 00:08:22,700 --> 00:08:27,380 Again, I'm refreshing the page and the file is still available. 91 00:08:28,360 --> 00:08:34,030 Anyone can get the file, even if the IP office demon was shut down. 92 00:08:35,140 --> 00:08:42,100 At the end of this lecture, let's talk about peening, which is a key term of IP office, peening is 93 00:08:42,100 --> 00:08:48,490 the mechanism that allows you to tell IP office to always keep locally a given object. 94 00:08:48,880 --> 00:08:55,930 IP office has a fairly aggressive caching mechanism that will keep an object locally for a short time 95 00:08:55,930 --> 00:08:59,940 after someone performs any type of operation on it. 96 00:09:00,430 --> 00:09:08,470 But these objects may regularly get garbage collected or removed to prevent garbage collection simply 97 00:09:08,590 --> 00:09:10,180 in the hish you care about. 98 00:09:10,870 --> 00:09:19,480 Objects added through the Apophis comment are recursively by default and typeface file exists as long 99 00:09:19,480 --> 00:09:26,050 as someone keeps it and a file from IP office is lost when there is no peer. 100 00:09:26,200 --> 00:09:27,740 That source, that file. 101 00:09:28,390 --> 00:09:34,900 So when there is no interest in the file anymore, we are taking a short break and in the next lecture 102 00:09:35,050 --> 00:09:38,050 I'll show you how to install IP office on Linux. 10307

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.