1. 1. What is Headjack
    ❱
    1. 1.1. Design - guiding principles
    2. 1.2. Identity & authorization
    3. 1.3. Content addressing
      ❱
      1. 1.3.1. Host vs data-centric
      2. 1.3.2. Blobs & persistent URIs
      3. 1.3.3. Names & paths
    4. 1.4. Messages
    5. 1.5. IDMs, preferences & graphs
    6. 1.6. Data storage & retrievability
    7. 1.7. Blocks, state & proofs, oh my!
    8. 1.8. Throughput & scalability
    9. 1.9. Headjack vs the competition
  2. ⬇⬇⬇ WORK IN PROGRESS ⬇⬇⬇
  3. 2. Implementation of Headjack

Headjack - the base layer of cyberspace

Blocks, state & proofs, oh my!