blog.zeppelin.solutions/deconstructing-a-solidity-contract-part-vi-the-swarm-hash-70f069e22aef

Sep 28, 2018 ... Figure 1: The metadata hash can be found in the last few opcodes of the runtime bytecode of a contract. ... In fact, if you analyze all the possible execution flows in this contract .... to connect to the same Swarm network to which the metadata file was ... Deconstructing a Solidity Contract — Part II: Creation vs.

www.usenix.org/events/hotos03/tech/full_papers/henson/henson.pdf

... reproduced paper. USENIX acknowledges all trademarks herein. ... to each other by comparing their hash values, using a collision-resistant .... chines, using a distributed file system to share data .... 5.1 Existence proof: Rsync vs. Bit-. Keeper.

techcrunch.com/2014/03/30/how-dropbox-knows-when-youre-sharing-copyrighted-stuff-without-actually-looking-at-your-stuff

Mar 30, 2014 ... Only when a file is shared from user-to-user (or with the Internet at large) ... Dropbox checks the hash of a shared file against a banned list, and blocks ... any cloud-based storage system where the user isn't handling all of the ...

www.jscape.com/blog/what-is-hmac-and-how-does-it-secure-file-transfers

Aug 31, 2016 ... An introduction to HMAC and how it's used in secure file transfer protocols like FTPS, SFTP. ... Recommended read: Symmetric vs Asymmetric Encryption ... An HMAC employs both a hash function and a shared secret key.

medium.com/textileio/whats-really-happening-when-you-add-a-file-to-ipfs-ae3b8b5e4b0f

Aug 28, 2018 ... If I change that file by even one bit, the hash will become something completely different. ... Have you ever noticed that IPFS hashes all seem to start with Qm ? This is because those .... ipfs ls -v $hash ... bits from multiple peers makes file sharing a breeze, and means you only need to share around a few ...