The Tahoe-LAFS decentralized secure filesystem.
Go to file
2021-09-08 10:48:32 -04:00
.circleci Upload eliot.log on CircleCI runs 2021-09-08 09:14:47 -04:00
.github The name must be pathless, it seems 2021-09-08 09:42:23 -04:00
docs fix markup error 2021-09-07 16:12:01 -04:00
integration Choose node names that won't conflict. 2021-07-30 11:27:41 -04:00
misc Limit Pickle protocol to version supported by Python 2. 2021-06-16 11:53:25 -04:00
newsfragments news fragment 2021-09-08 09:15:40 -04:00
nix Python 3 port is essentially done-get rid of relevant tests and tracking code. 2021-07-30 11:13:57 -04:00
release-tools refactor more 2018-05-29 13:17:32 -06:00
src/allmydata Bridge Foolscap logs to Twisted's so they appear in test.log 2021-09-08 10:48:32 -04:00
static Remove Nevow from the static script 2020-10-21 10:16:44 -04:00
.coveragerc This is probably a better way to handle multiple Python versions 2020-10-14 13:10:23 -04:00
.gitignore test(vcs): Reconcile devel docs from PR #798 2020-09-30 07:37:52 -07:00
.pre-commit-config.yaml Only run codechecks on changed Python source files 2020-11-19 11:12:08 -05:00
CONTRIBUTORS.rst Add suggestion for Tahoe Committers 2021-05-07 16:10:24 +02:00
COPYING.GPL Fix repeated 'the' in license text. 2011-08-19 13:48:36 -07:00
COPYING.TGPPL.rst magic first line tells emacs to use utf8+bom 2013-11-08 21:08:05 +00:00
CREDITS Merge branch 'master' into release-1.15.0-rc0 2021-02-02 12:14:13 -07:00
docker-compose.yml add dockerfile for hacking with docker compose file for local environment 2017-09-19 09:25:39 -07:00
Dockerfile Remove $HOME/.cache/ directory after building. 2016-09-26 15:19:04 -07:00
Dockerfile.dev add dockerfile for hacking with docker compose file for local environment 2017-09-19 09:25:39 -07:00
Makefile Update developer docs wrt pre-commit 2020-12-01 09:55:17 -05:00
MANIFEST.in setup.py/MANIFEST.in: include missing files 2017-01-18 16:28:23 -08:00
mypy.ini Incorporate mypy-zope to support zope interfaces. 2020-11-29 13:57:46 -05:00
NEWS.rst update release-notes 2021-03-23 11:16:45 -06:00
pyinstaller.spec Additional hidden imports due to use of Future. 2020-07-03 13:44:47 -04:00
README.rst Small typo fix 2021-06-01 19:50:21 +02:00
relnotes.txt update release-notes 2021-03-23 11:16:45 -06:00
setup.cfg Add a codecheck for tabs in indentation 2020-08-03 21:14:55 -04:00
setup.py Get rid of unnecessary version constraints. 2021-07-05 16:17:26 -07:00
Tahoe.home rename bin/allmydata-tahoe to bin/tahoe. Closes #155. 2007-10-11 03:38:24 -07:00
towncrier.toml Rename towncrier configuration file 2021-06-07 15:31:12 -04:00
tox.ini Remove PYTHONIOENCODING, set for towncrier, no longer run here 2021-08-13 09:24:00 -04:00
ws_client.py move to different url 2019-03-21 15:00:02 -04:00

Free and Open decentralized data store

image0

Tahoe-LAFS (Tahoe Least-Authority File Store) is the first free software / open-source storage technology that distributes your data across multiple servers. Even if some servers fail or are taken over by an attacker, the entire file store continues to function correctly, preserving your privacy and security.

code of conduct documentation status circleci githubactions code coverage

Table of contents

💡 About Tahoe-LAFS

Tahoe-LAFS helps you to store files while granting confidentiality, integrity, and availability of your data.

How does it work? You run a client program on your computer, which talks to one or more storage servers on other computers. When you tell your client to store a file, it will encrypt that file, encode it into multiple pieces, then spread those pieces out among various servers. The pieces are all encrypted and protected against modifications. Later, when you ask your client to retrieve the file, it will find the necessary pieces, make sure they havent been corrupted, reassemble them, and decrypt the result.

image2
The image is taken from meejah's blog post at Torproject.org.

The client creates pieces (“shares”) that have a configurable amount of redundancy, so even if some servers fail, you can still get your data back. Corrupt shares are detected and ignored so that the system can tolerate server-side hard-drive errors. All files are encrypted (with a unique key) before uploading, so even a malicious server operator cannot read your data. The only thing you ask of the servers is that they can (usually) provide the shares when you ask for them: you arent relying upon them for confidentiality, integrity, or absolute availability.

Tahoe-LAFS was first designed in 2007, following the "principle of least authority", a security best practice requiring system components to only have the privilege necessary to complete their intended function and not more.

Please read more about Tahoe-LAFS architecture here.

Installation

For more detailed instructions, read docs/INSTALL.rst .

Once tahoe --version works, see docs/running.rst to learn how to set up your first Tahoe-LAFS node.

🤖 Issues

Tahoe-LAFS uses the Trac instance to track issues. Please email jean-paul plus tahoe-lafs at leastauthority dot com for an account.

📑 Documentation

You can find the full Tahoe-LAFS documentation at our documentation site.

💬 Community

Get involved with the Tahoe-LAFS community:

🤗 Contributing

As a community-driven open source project, Tahoe-LAFS welcomes contributions of any form:

Before authoring or reviewing a patch, please familiarize yourself with the Coding Standard and the Contributor Code of Conduct.

🤝 Supporters

We would like to thank Fosshost for supporting us with hosting services. If your open source project needs help, you can apply for their support.

FAQ

Need more information? Please check our FAQ page.

📄 License

Copyright 2006-2020 The Tahoe-LAFS Software Foundation

You may use this package under the GNU General Public License, version 2 or, at your option, any later version. You may use this package under the Transitive Grace Period Public Licence, version 1.0, or at your choice, any later version. (You may choose to use this package under the terms of either license, at your option.) See the file COPYING.GPL for the terms of the GNU General Public License, version 2. See the file COPYING.TGPPL for the terms of the Transitive Grace Period Public Licence, version 1.0.

See TGPPL.PDF for why the TGPPL exists, graphically illustrated on three slides.