pagina 4/1 🇳🇱



The ImPossible Network

Het OnMogelijke Netwerk

12 years of research and development is coming to fruition as we put together the final building blocks of what some said was impossible: Secure Access For Everyone.

12 jaar onderzoek en ontwikkeling werpt eindelijk zijn vruchten af wanneer we de laatste stukjes van de puzzel leggen waarvan sommige zeide dat het onmogelijk was: Veilig Toegang voor Iedereen.

LATEST UPDATE29 August 2019

Meest recente update 29 augustus 2019

Vault Phase 1

Vault fase 1

The final piece of the puzzle is complete and we now have the SAFE CLI, SAFE Client Libs, SAFE Vault and SAFE Browser.

Het laatste deel van de puzzel is compleet nu we SAFE CLI, SAFE Client Libs, SAFE Vault en de SAFE browser hebben.

SAFE Network Forum

Safe Netwerk Forum

Subscribe for updates:

Meld je aan voor updates:

Email Address

Email adres

Sign Up




Phase 1 Vaults

Fase 1 Vaults

This Phase 1 Vault release is primarily to showcase the Network features to Consumers (people using the Network to browse, share data, etc.) and Creators (developers or those publishing content). It allows users to test out features such as SAFE CLI and SAFE Client Libs, as well as introducing the new data types.

Deze Phase 1 Vault-release is voornamelijk bedoeld om de netwerkfuncties te demonstreren aan consumenten (mensen die het netwerk gebruiken om te browsen, gegevens te delen, enz.) en makers (ontwikkelaars of degenen die content publiceren). Het stelt gebruikers in staat om functies zoals SAFE CLI en SAFE Client Libs uit te testen, en om de nieuwe gegevenstypen te introduceren.

It’s easy to use. Just download a Vault binary which will run locally on your computer. Details and links can be found in this forum post.

Het is gemakkelijk te gebruiken. Download gewoon een Vault-binair bestand dat lokaal op uw computer wordt uitgevoerd. Details en links zijn te vinden in dit forumbericht.



SAFE Fleming Network

SAFE Fleming Netwerk

The next major milestone for the SAFE Network. Whilst the Shared Vault Network will continue to function, this will be a standalone Network that will enable individuals to run Vaults - decentralised storage from home computers. The release of Fleming will be notable for many reasons, not least the fact that with data storage, the Network will now also contain Test Safecoin.

De volgende belangrijke mijlpaal voor het SAFE-netwerk. Hoewel het Shared Vault-netwerk zal blijven functioneren, zal dit een op zichzelf staand netwerk zijn waarmee individuen Vaults kunnen uitvoeren - gedecentraliseerde opslag vanaf thuiscomputers. De release van Fleming zal om vele redenen opmerkelijk zijn, niet in de laatste plaats het feit dat met dataopslag het netwerk nu ook Test Safecoin zal bevatten.

Fleming Feature

Fleming Kenmerk







The ability to log into a decentralised network without the permission or existence of a third party

De mogelijkheid om in te loggen op een gedecentraliseerd netwerk zonder de toestemming of het bestaan van een derde partij



MaidSafe invented the technology that lets someone log into a decentralised network securely without requiring the involvement of a third party. The Shared Vault Network is the only place in the world today that you can see this in action.

MaidSafe heeft de technologie uitgevonden waarmee iemand veilig kan inloggen op een gedecentraliseerd netwerk zonder tussenkomst van een derde partij. Het Shared Vault-netwerk is de enige plek ter wereld waar u dit in actie kunt zien.



Data is encrypted on your computer before being stored on the Network: no keys or passwords ever leave your machine

De gegevens worden op uw computer gecodeerd voordat ze op het netwerk worden opgeslagen: sleutels of wachtwoorden verlaten nooit jouw machine



Invented by MaidSafe, this is the process by which any file to be stored in the Network is first broken into chunks, hashed, and then encrypted. These chunks are then themselves encrypted using the hash of another chunk from the same file.

Uitgevonden door MaidSafe, dit is het proces waarmee elk bestand dat in het netwerk wordt opgeslagen, eerst in stukken wordt opgedeeld, gehasht en vervolgens wordt gecodeerd. Deze blokken worden vervolgens zelf versleuteld met behulp van de hash van een ander blok uit hetzelfde bestand.

Self-Encryption explained

Zelfversleuteling uitgelegd

Disjoint Sections

Onsamenhangende secties

Otherwise known as Sharding, this allows the Network to scale by splitting responsibilities for specific Network functions.

Ook wel bekend als Sharding, hierdoor kan het netwerk worden geschaald door verantwoordelijkheden voor specifieke netwerkfuncties op te splitsen.



Ensures that the Network can scale by managing the responsibilities and locations of each node without requiring any human intervention. This also acts as a security measure to ensure that an attacker cannot choose their location or responsibilities.

Zorgt ervoor dat het netwerk kan worden geschaald door de verantwoordelijkheden en locaties van elk knooppunt te beheren zonder menselijke tussenkomst. Dit fungeert ook als een beveiligingsmaatregel om ervoor te zorgen dat een aanvaller zijn locatie of verantwoordelijkheden niet kan kiezen.

Message Relay


Ensures a message can be sent between nodes in different Disjoint Sections

Zorgt ervoor dat een bericht kan worden verzonden tussen knooppunten in verschillende onsamenhangende secties



Ensures that a message can be sent between nodes in different Disjoint Sections. In this early iteration, each message contains signatures of the members of the Disjoint Sections but does not yet verify the signatures themselves.

Zorgt ervoor dat een bericht kan worden verzonden tussen knooppunten in verschillende disjuncte secties. In deze vroege iteratie bevat elk bericht handtekeningen van de leden van de disjuncte secties, maar verifieert het de handtekeningen zelf nog niet.



Asynchronous consensus algorithm

Asynchroon consensus-algoritme



Ensures that a global decentralised, permissionless Network can reach agreement about events that are permitted and the order in which they are to be recorded. A DAG-based algorithm that achieves the highest standard of security possibile, invented by MaidSafe in such a way that it ensures it is mathematically certain that every part of the Network will reach eventual agreement. In Fleming, we’ll be releasing a highly asynchronous version of PARSEC, with full asynchronicity to come later.

Read More

Node Ageing

A decentralised system for ranking the behaviour, performance and abilities of nodes on the Network that requires no human intervention.


Each node on the SAFE Network is given an age by the Network itself. The node age increments every time that a node moves between Disjoint Sections, with only the most senior (Elders) entitled to vote during the PARSEC consensus algorithm.

Dig into the detail in the RFC, and join the discussion on the forum.

Read the RFC

Secure Message Delivery

Trusted communication between nodes - messages with authenticated source


Ensures messages are sent and signed in such a way that lets nodes rely on the contents of each message despite having no previous relationship with the sender. This solves a problem faced by many existing blockchain-based projects and is essential when you have a Network that will autonomously move nodes around as required.

Read the RFC

Reliable Message Delivery

Communication guaranteeing the successful delivery of messages.


Ensures that all sent messages will be successfully delivered to their destinations, even when some nodes responsible for the delivery are failing.

Read the RFC


The low-level language which users connecting to SAFE will use for all network communications


Software that lets computers communicate in an encrypted manner on the SAFE Network. The software provides the infrastructure for messages to travel whilst the Routing layer of the Network sets the rules about which directions those messages can travel in.

Malice Detection

Preventing malicious nodes subverting the consensus algorithm, PARSEC


The way that nodes identify malicious nodes that are damaging the Network within a Disjoint Section and the mechanism by which they agree to eject that node, or mitigate the risk.

Read the RFC

Test Safecoin & Wallet

Allow the Network to charge, and a user to send and receive payments to a wallet, in units called Test Safecoins


Safecoin is the incentive mechanism that encourages individuals to provide the computing resources that the Network requires: storage, broadband, and CPU resources.


The process of providing resource and receiving Safecoin in return


Individuals who choose to supply the resources that the Network requires have the opportunity to be rewarded with Safecoin. This work ensures that the Network rewards those who provide it with valuable resources.

Vaults From Home

The ability for anyone to download software and run Vaults from home, creating decentralised storage for the Network


Decentralised data storage is a key element of the SAFE Network. This release will enable nodes to participate regardless of the resources they offer.

Published and Unpublished Data Types

Allow the network to store Published and Unpublished data via AppendOnlyData or MutableData types


Published data refers to content that is published (made available) for everyone such as websites, blogs, or research papers. For such public content, it becomes important to retain a history of changes. History must not be allowed to be tampered with and the published data must remain forever. Unpublished data is data that is not desired to be made public such as personal data or organisations’ data stored on the network

Unpublished ImmutableData Data Type

Enhance ImmutableData to make it an unpublished or published, with the difference that unpublished can be deleted


There are many times when a user will require to create Immutable Data to store private content. As long as this content is not published (made available for others) this will be deleteable by the data owner only.


SAFE Maxwell Network

The release of SAFE Maxwell builds on top of Fleming and enables the network to upgrade, improves security and sets the ground work for switching test SAFE Coin to real SAFEcoin.

Maxwell Feature



Spam Handling

Ability to handle spam attacks


Spam includes nodes attempting to carry out activities that they shouldn’t or valid activities at a scale that is intended to choke the Network. The Network should be able to withstand a reasonable volume of such attacks.

Identity Management

Ability for users to create and manage multiple identities for use on the network


Users will be able to create multiple identities in the Network. Each identity can be used as required by the User and each should be independent unless the User explicitly wants to connect them. This helps protect identity and privacy.


The ability for the Network to upgrade itself, with no harm caused


The Network will have the ability to upgrade itself in order to allow features and improvements to disseminate throughout the Network. The upgrades must be done in a way such that they don’t cause harm to the Network.

This is an important stage in the evolution of the Network as it means that new software can then continue to be rolled out onto the existing Network without disrupting the existing functionality.