You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Because of third-party gateway vulnerabilities outlined in §6.1 below, apps requiring end-to-end validation of content read/write should avoid gateways when possible.
91
+
If the app must employ an extenal gateway, such apps should use ipfs.io or a trusted third-party.
An IPFS node cryptographically validates content it fetches.
97
+
Employing a third-party public or private HTTP(S) gateway sacrifices end-to-end cryptographic validation of delivery of the correct content.
98
+
An inability to guarantee the proper behavior of such gateways undermines trust in fetched content.
99
+
The public gateway ipfs.io serves as an independent reference for returned content.
100
+
101
+
Similarly, guarantee of proper behavior when writing content via a third-party HTTP(S) writable gateway requires a fetch of written content via a native IPFS node or the ipfs.io public gateway.
0 commit comments