Peer-to-Peer-Based Social Networks: A Comprehensive Survey link.springer.com/article/10.1

and use centralized computing systems; therefore, the control and management of the systems lies entirely in the hands of one provider, who must be trusted to treat the data and communication traces securely.

The that incorporates et al. is a semi-centralized computer system where the control and management of the systems lies entirely in the hands of instance administrators.

As a zero-trust alternative, peer-to-peer (P2P) technologies promise to support end-to-end communication, uncompromising access control, anonymity and resilience against censorship and massive data leaks through misused trust.

Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.