• Corpus ID: 53050295

Archain: An Open, Irrevocable, Unforgeable and Uncensorable Archive for the Internet

  title={Archain: An Open, Irrevocable, Unforgeable and Uncensorable Archive for the Internet},
  author={Sam A. Williams and Will Jones},
Widespread internet access has changed almost every aspect of human life. A vast proportion of the combined knowledge of humanity is housed on the internet, and available in our pockets at any time. While the internet has had a staggering impact on the organisation of society, some fundamental flaws with the system remain. Primary among these is the ephemeral nature of the information stored on the network – it can change or disappear at any time. In this paper we present a sister network that… 

Figures from this paper

A Practitioner’s View on Distributed Storage Systems: Overview, Challenges and Potential Solutions

An overview of the emerging technology involved with distributed storage systems is presented, including five solutions currently available, including their designs, how they secure and store files, and whether or not these files can be deleted in order to meet record disposition requirements and regulations.

On the Heritage of Crypto Assets -- Tales From the Crypt Protocol

  • F. Prost
  • Computer Science, Mathematics
  • 2022
A distributed, privacy preserving, protocol to establish a consensus on the death of the owner of crypto assets: the Tales From the Crypt Protocol, which could be incorparated into any arbitrary crypto platform.



Bitcoin: A Peer-to-Peer Electronic Cash System

This work proposes a solution to the double-spending problem using a peer-to-peer network, where the network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof- of-work.


The blockchain paradigm when coupled with cryptographically-secured transactions has demonstrated its utility through a number of projects, with Bitcoin being one of the most notable ones, and Ethereum implements this paradigm in a generalised manner.

Geographies of global Internet censorship

More than one-quarter of the planet’s population uses the Internet today, although access to it is highly uneven throughout the world. While it is widely celebrated for its emancipatory potential,

Internet Censorship in Iran: A First Look

The network topology of the censorship infrastructure in Iran is mapped and it is found that it relies heavily on centralized equipment, a property that might be fruitfully exploited by next generation approaches to censorship circumvention.

Internet censorship in Turkey

: Turkey passed an internet censorship law in 2007 with the declared objective of protecting families and minors (Akdeniz, 2010). It established a unit within the regulator BTK (Information and

Programming Elixir 1.2: Functional

This book is the introduction to Elixir, a functional, concurrent language built on the rock-solid Erlang VM that benefits from almost 20 years of research into high performance, highly parallel, and seriously robust applications.

Internet Censorship in China: Where Does the Filtering Occur?

This work explores the AS-level topology of China's network, and probes the firewall to find the locations of filtering devices, finding that even though most filtering occurs in border ASes, choke points also exist in many provincial networks.

The Holocaust and the Book: Destruction and Preservation

Between 1933 and 1945, Nazi Germany systematically destroyed an estimated 100 million books throughout occupied Europe, an act that was inextricably bound up with the murder of 6 million Jews. By

Secure Hash Standard | NIST

This standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated.

Nineteen Eighty-Four (1984)