
Security News
Meet Socket at Black Hat Europe and BSides London 2025
Socket is heading to London! Stop by our booth or schedule a meeting to see what we've been working on.
Centerless is a realm of pure cryptography resulting from the de-centering of data from its address.
centerlessCenterless is a realm of pure cryptography resulting from the de-centering of data from its address.
Since input data to cryptography and the resulting proof addresses are inter-dependent and deterministic, it is then possible to reach proof without a fixed representation or address since any variations in representations or addresses representing the same bytes will result in the same proof.
This can be used to:
Things are understood to be centralized when their address describes a single (center) location.
An address is understood to be de-centralized when it is de-located from its singular location address. One-way hash functions and derivative one-way cryptography are used to arrive at a hash based address that relies upon no autority or central location since anyone implementing the hash functions can produce proof.
In both of these systems (centralized and de-centralized),
The appearance of "de-centering" is the loss of singularity in data location because "center" had previously defined as "location".
In truth, data and addresses have been "de-located." In both systems, data and addresses are inter-dependent. The center of one system is a location and the center of the other is a hash digest.
The cryptography we're talking about here is very simple. We're passing data into a function that returns some form of proof: a deterministic, securely randomized, byte range of a predictable (fixed) size.
The problem is that every new cryptographic function we write results in a different address. This means that data, the thing we're actually trying to represent, is being divided and segmented into new silos resulting from the re-centering of the address to a fixed representation of a single method of cryptography.
As an example, many data products across many categories offer features related to the hash digest of an API result or file. File and data addresses for IPFS files, Bittorrent, dat, git, and every other system are built from a merkle structure that includes meta information and/or represents the file as a byte array.
This difference in addresses has meant a lack of compatibility between systems and lead all of these sytems to pursure their own new transport layers with minimal support for existing transports like HTTP.
Centerless brings data and addresses into perfect union such that the resulting cryptography does not depend on a single identifier (center).
If there's a means of cryptographic verification between formats, then centerless can be used to treat them equally. As long as the resulting proofs match data from different encodings, addresses, and locations can be mixed and matched.
All data, everywhere on the Internet, using any transport (HTTP, FTP, git, Bittorrent, IPFS) is acceptible input if it ends in a matching proof. Once anyone has a matching proof they can publish the cryptography that arrived at that proccess for the benefit of others doing the same.
Let's define "data" in the abstract as "some bytes." All data, at some point or another, is turned into bytes. This way, centerless works with all systems that work in bytes, which is all systems.
Let's call this abstract interface for data Centerless.
There are three interfaces that inherit, or extend, this interface.
Input (Bytes)Instructions (Array of Numbers)Proof (Array of Hash Digests)Each of these interfaces derive from Centerless and Centerless
can be seen as these interfaces as a triple ([ Input, Instructions, Proof])
representing a cryptographically secure virtual memory system
that can produce and consume partial proofs using the same interface
that provides partial selectivity for the Input.
This results in forms of recursion that may previously have appeared to be impossible as they are in-expressable in any system of cryptography that exclusively builds upon its own encoding. But anyone familiar with cryptography enough to recognize the power of equivalency should see that one must only entangle the determinism of one system with another to move between statements of equality never intentionally expressed in any of the original encodings.
What holds these unions together are the characteristics of each interface and how they interrelate.
Input is a view of data as bytes.
.read(offset, close) interface.Input is also a view of data as a byte array.
Since Instructions and Proofs are valid Input they
also have these characteristics.
Instructions is a view of an array of numbers.
Instructions. this allows Input to remain virtualized while the proof
function writes into the allocated width.Remember, proof functions can .read() from anywhere in the Input. When
we build more sophisticated data structures that need more than just numbers
it'll be passed as additional Input, so don't go thinking that the only thing
a proof function can understand or build against is numbers.
Instructions only need to be what is necessary to selectively .read() the input
and allocate the width of the proof.
Instruction interfaces implement a specific encoding scheme when they are .read()
but are often able to stay agnostic of encoding. Even when they aren't agnostic of encoding,
there aren't that many potential encoding schemes, so equivalency proofs can be generated
and generalized for a small set of potential encodings.
Proof is a view of an array of hash digests.
All proofs in centerless are hash function agnostic.
When proofs are addressed as a single block the resulting address
must be a multihash. The hash algorithm and digest length of that
address is the same hash algorithm and length used for every
hash in the proof.
Since proofs are encoded separtely from input data and proof
instructions proofs are easily upgraded to new hash functions without
re-encoding any of the underlying data layer. When addresses
to foreign resources are written using a different multihash
the differences between them can be close with equivalencies
just like the differences in all other Input sources.
Various means of retreiving data on the internet exist.
In Centerless, verifiable claims are written regarding any relevant location data needed to satisfy proof might reside. These claims map a URI to a hash digest. It may be the case that this claim is never entirely verified, as is the case when a sub-ranges of data are used.
This allows centerless to leverage numerous centralized data transmission protocols without ever becoming centralized itself.
This allows centerless to liberate data from any location you find it in, since anything you build upon in centerless depends not on the location but on the cryptography resulting from that location and can grow to include any other location that can make proof.
All extant crytopgraphic addresses for a file are one of two things
Input can represent both of these scenarios natively with DigestProof
and ByteArrayProof.
Inputs, and equivalencies between these representations and native representations,
can be implemented for
FAQs
Centerless is a realm of pure cryptography resulting from the de-centering of data from its address.
The npm package centerless receives a total of 1 weekly downloads. As such, centerless popularity was classified as not popular.
We found that centerless demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Socket is heading to London! Stop by our booth or schedule a meeting to see what we've been working on.

Security News
OWASP’s 2025 Top 10 introduces Software Supply Chain Failures as a new category, reflecting rising concern over dependency and build system risks.

Research
/Security News
Socket researchers discovered nine malicious NuGet packages that use time-delayed payloads to crash applications and corrupt industrial control systems.