IPFS — Decentralized Distribution¶
CogSec is published on the IPFS (InterPlanetary File System) network. Every page you read exists on dozens of servers across the world, without any central authority.
Direct Access¶
CID (immutable content)¶
The cryptographic identifier of the current content. Each version has a unique CID.
IPNS (stable address)¶
Always points to the latest version. The address never changes.
How It Works¶
- Publication — The site is compiled into static files and added to IPFS. Each file receives a unique cryptographic fingerprint (CID).
- Pinning — Content is pinned on our local node and on Pinata (replicated in Europe and the United States).
- Propagation — Every visitor to cogsec.fr automatically warms the cache of 90+ public IPFS gateways worldwide.
- Resilience — As long as a single IPFS node holds the content, it remains accessible. More visitors means a stronger network.
Your Contribution¶
Thank you
Every visit to cogsec.fr strengthens the IPFS network.
By loading this page, your browser silently requested the content from IPFS gateways across every continent. Each gateway that responds keeps the content cached. You just made CogSec more resilient.
You didn't have to install anything. Nothing to configure. Nothing to pay. Your presence alone does the work.
Verification & versioning¶
The IPFS CID is always one version behind
The CID shown above points to the previous version of the site. This is structurally unavoidable: a file cannot contain its own hash, because changing the hash changes the file. The CID is therefore always from build N-1.
IPNS always points to the latest version. Use the IPNS address to access the most recent content.
Articles are PGP-signed independently of the CID — the signature verifies the article content, not the container. See the PGP page.
Why IPFS?¶
| Property | Traditional Web | IPFS |
|---|---|---|
| Censorship | One server down = site dead | Replicated across dozens of nodes |
| Integrity | Server can modify content | CID guarantees content |
| Availability | Depends on one host | Globally distributed |
| Verifiability | Trust the server | Cryptographic verification |
An academic document about social control should not depend on a single point of failure.
The grandfather poured concrete for 5 neighbors. The grandson pours cache through 5,000 visitors.