Added
Link Here
|
1 |
Tang is a server for binding data to network presence. |
2 |
|
3 |
This sounds fancy, but the concept is simple. You have some data, but you only |
4 |
want it to be available when the system containing the data is on a certain, |
5 |
usually secure, network. This is where Tang comes in. |
6 |
|
7 |
First, the client gets a list of the Tang server's advertised asymmetric keys. |
8 |
This can happen online by a simple HTTP GET. Alternatively, since the keys are |
9 |
asymmetric, the public key list can be distributed out of band. |
10 |
|
11 |
Second, the client uses one of these public keys to generate a unique, |
12 |
cryptographically strong encryption key. The data is then encrypted using this |
13 |
key. Once the data is encrypted, the key is discarded. Some small metadata is |
14 |
produced as part of this operation which the client should store in a convenient |
15 |
location. This process of encrypting data is the provisioning step. |
16 |
|
17 |
Third, when the client is ready to access its data, it simply loads the metadata |
18 |
produced in the provisioning step and performs an HTTP POST in order to recover |
19 |
the encryption key. This process is the recovery step. |
20 |
|
21 |
WWW: https://github.com/latchset/tang |