Privy Labs Protocol Whitepaper v 1.0
  • Privy Labs Protocol
    • Introduction
      • The paradox of social media
      • The persistence of piracy
      • The bottom line
    • Solution Overview
    • Team
  • Our Philosophy & Values
    • 3 Core Tenets
    • Our Why
    • Why Web3
  • Our Approach
    • Problem-solving at the source
      • Core Primitives
      • Copyright - Originality, Creativity, & Fixation
      • The DMCA
      • Removal
  • The Core Technology
    • Systems Overview
      • Virtual Account System
        • Account Abstraction
        • Privacy
        • Gas
      • Content Certificate & Tracking System
        • Proof of Ownership
        • Watermarking
        • Encryption & Cryptography
        • Storage
        • Publicity & Privacy
      • Content Verification Network
        • Permissioned Approval
        • Takedown
  • Use Cases
    • Use Cases
      • Sensitive content: Adult creators, models, & sex workers
      • Content Creators
      • Digital artists & photographers
      • Journalists
      • Families
      • Celebrities
      • Social media platforms & creative marketplaces
      • Trust & Safety Organizations
  • PrivyCam
  • Governance & Community
    • Privy DAO
  • Tokenomics & Incentives
    • Incentive Model
  • Risks & Mitigants
    • Risks & Mitigants
  • Our Roadmap
    • Our Roadmap
Powered by GitBook
On this page
  1. The Core Technology
  2. Systems Overview
  3. Content Certificate & Tracking System

Storage

PreviousEncryption & CryptographyNextPublicity & Privacy

Last updated 2 years ago

Before a piece of content exfiltrates a Privy application with encrypted intention, it’s EXIF data is first sanitized prior to being split into uniform chunks. Each individual chunk is then encrypted per the encryption schema above and archived. The archive is then uploaded to , a distributed P2P storage network. Each upload yields a unique CID (content ID) from IPFS:

bafybeigdyrzt5sfp7udm7hu76uh7y26nf3efuylqabf3oclgtqy55fbzdi

This CID is then publicly registered on CCTS as a pointer to an encrypted resource.

IPFS