On Sun, Jun 1, 2014 at 3:11 PM, Greg Troxel <g...@ir.bbn.com> wrote: > > This can be viewed as a bug in tahoe :-) > But seriously, fixing the FUSE interface would be a great contribution. > It's not clear to me how efficient the FUSE interface has to be before > it isn't the limiting issue; tahoe is not a fast filesystem.
Like Leif mentioned in reply, there *is* the SFTPd that comes with Tahoe-LAFS, and that is supported by the current Tahoe-LAFS core devs. Like gdt, I also don't know whether its performance would satisfy for this use case. > Are you proposing to store the capabilities to access the persistent > data on the local media (removable flash, I'm assuming)? I've come > into this thread somewhat late, but the security and usability > properties are not entirely clear to me. This is a key question (so to speak). How is the cap stored? The cap is basically just the encryption key plus the URL to reach the remote server. (The remote server stores only ciphertext, remember.) So, the cap needs to be protected exactly like a symmetric encryption key needs to be protected: if it is copied, the copier can read your files, and if it is lost, then *you* can never again read your files. I usually advise people to print the cap out on paper. > (resident old-school unix crank on the tahoe list) We love you, gdt. Never change. Regards, Zooko Wilcox-O'Hearn Founder, CEO, and Customer Support Rep https://LeastAuthority.com Freedom matters. _______________________________________________ Tails-dev mailing list Tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev To unsubscribe from this list, send an empty email to tails-dev-unsubscr...@boum.org.