SAFE Network Dev Update - October 4, 2018


Here are some of the main things to highlight this week:


In amongst all of the marketing work in preparing for the releases leading up to the Alpha 3 Network over the next few months (much more to come on this, a recurring focus that we’ll be mentioning more than once in the coming weeks we suspect), there have been a couple of items about the SAFE Network this week. First up is an interview @dugcampbell gave to the new CyptoQuest podcast
. We also provided comments to the news website Verdict for a news article that investigated the viability of blockchain-based social media alternatives. And finally, @dugcampbell was the guest on a new episode of the Talking Cryptocurrency podcast - the recording should be released in a couple of weeks.


First of all, before the recruitment update, we would like to welcome @shriram2301 on board. @shriram2301 will be based in the Chennai office and will be working alongside @bochaco, @joshuef and @hunterlester. Welcome to the team :smile:

Once again there has been a lot going on with recruitment and things have moved on nicely from last week’s update. Our new Dev Ops Engineer has confirmed he will be able to start work with us on October 22 in just over 2 weeks. @victoria is still working on the Software Test Engineer role and will hopefully be able to update on progress soon.

Last week @nicklambert and @victoria were busy conducting 1st stage interviews for the Marketing Strategist position. This week it has been the turn of @dugcampbell and Victoria to conduct 2nd stage interviews. We are hoping to be in a position to progress to final stage interviews in the next week and hopefully get the role filled soon :smile:

We have offered a candidate the role of Rust Engineer with the Routing Team and the candidate has accepted :tada: and even better they will be based here at HQ in Ayr. We are in the process at the moment of finalising details and will have more information for you next week.

There have been some internal changes this week with @nadia being promoted from Technical Executive Assistant to Project Manager - well done Nadia :tada: We are now recruiting for an Executive Assistant to replace Nadia.

As you know we are looking for a Network Engineer to join the Crust team and we have enlisted the help of the team in Chennai to find this elusive engineer. Over and above the Network Engineer role, the team in Chennai are looking to recruit an Assistant Manager to provide support to @krishna.


With the safe_app_java pull request in place and under review, we are putting together a tutorial to get developers started with creating apps for the SAFE Network. Along the way, we are identifying potential improvements in the API and implementing them.

A PR which will allow us to hide experimental APIs behind a flag has been recently reviewed and merged into the safe_app_nodejs repo. With this in place, we can now start merging the APIs we are experimenting with on the dev branch onto the master branch. The first function we will be trying to merge is a fetch API which can be used by applications to find data on the network from a URI, in the same way as the webFetch function, with the difference that instead of returning a compliant HTTP response with the data serialised, it returns an API object. As an example, when calling this function with a URI which references a MutableData location, a MutableData object is returned so all the MD API functions are available and can be used by the app to traverse its entries. We are thinking this will be useful for linked data applications which are intended to read and follow URI links.

SAFE Client Libs

We’re continuing to work on the SAFE Crypto improvements and integrations. While we have completed the SAFE Client Libs part, it still depends on other libraries which haven’t been completely integrated with SAFE Crypto yet, so while Crust and Routing are already done and available in their respective dev branches, some other fundamental libraries like Self-Encryption are not. @marcin has been working on fixing that and the PR for Self-Encryption is now complete and undergoing a review.

We have also discovered that while we provide support for attached signatures in the SAFE App Crypto API, they are not available in the SAFE Crypto implementation. However, as the front-end team really doesn’t use this API for any of their apps, we’ll not be adding that to the SAFE Crypto API but phasing it out from Client Libs instead because attached signatures provide little benefit over the detached ones. As this breaks the API on some level, app developers need to check if they use the sign or verify functions: they’re going to be switched to detached signatures in the upcoming Client Libs release.

Last but not least: the required changes in SAFE Crypto have been reviewed & merged and SAFE Crypto 0.5.0 was released.


Last week was an exciting week for the Routing team as we finished Dynamic Membership, the commits fixing the last few bugs and introducing the last integration tests were merged on Friday :tada:. This has allowed us to start soak testing the integration tests, yielding no failures so far after running the tests continually for a couple of days.

This week we started to focus on detecting and handling malice, something that’s crucial we correctly cover. Why is malice handling important? In a permissionless and decentralized network like SAFE, malicious agents are an unfortunate reality which needs to be accounted for. If a node is identified as malicious, it will be kicked out of the section and replaced with a new, hopefully honest node. This helps the network to be self-healing. The first set of PRs has already been merged, and more are on the way.


This week we kept testing the Service::connect_all() and probe_nat() functions as they allow us to collect miscellaneous connectivity information which is very important to us at this stage. We discovered some fundamental issues with the NAT probing function and fixed them. Also, at the same time we discovered some undesired behavior in both the p2p and Crust crates:

  • We now make sure the connection bootstrap happens only over TCP (PR). We only bootstrap off directly accessible peers and in such case TCP should always be available. TCP is a lot more robust and reliable than uTP. So there’s no real motivation to use uTP for bootstrapping.
  • The p2p crate was doing some redundant work: along with the hole punched connections it was attempting direct connections too. This functionality is already implemented in Crust and we want to keep the p2p crate solely responsible for hole punching. As a result, a lot of code was removed. This makes it easier to reason about the p2p behavior and the code got simpler :slight_smile:

Extensive internal testing revealed some bugs in connect_all(): direct incoming connections were never properly accepted. This is now fixed but we need to do more testing to be sure :slight_smile:

In parallel, we have been working on a test based on the older p2p crate implementation. The old implementation serves as a good benchmark for the NAT traversal: it should help us to uncover lurking regressions and bugs in the dev version of Crust in case there are more of them. With data collected from both clients, we can be certain that if the results differ then there is a high probability of a bug needing a fix. So far, we’re seeing a higher percentage of hole punching successes with the client based on the old p2p crate version. We’ll keep investigating and trying to understand the discrepancy between the statistics.


First! Thank you for the incredible work team @MaidSafe!


Welcome aboard @shriram2301!!!


Congrats with the promotion @Nadia :tada:

Great update, pace is definitely on the up and up!


A warm welcome! Overall great update, as always.


Keep up the good work!


Thanks so much for all of the hard work!


Congrats to

Getting closer. :slightly_smiling_face: :muscle::balloon:

Alpha 3 seems to be in reach in a not to distant future, then it feel like momentum will kick for real and the scale will tip to advantage for completion.

Also nice to know that you guys seems to have a good grip and controll TCP/uTP, which will hopefully be even better in coming time. So much progress, “the force is strong in this one”!!!


Great effort Maidsafe. And all the new hires on board and in the pipeline. Coming together nicely. Only 80 days to Christmas and then you can have a day off.


I honestly could not have predicted the team would be growing so quickly not to mention the fact that every team member is so qualified and unique/creative in their expertise. Huge props to @nicklambert @victoria @dugcampbell and anyone else involved on the hiring of such great candidates.


Welcome aboard @shriram2301 you are in for a great time in a great project.

Congrats @Nadia well deserved.

And I have to agree with @Nigel, great recruitment team resulting in great employees. @nicklambert @victoria @dugcampbell plus any others, thankyou for keeping the Maidsafe team great.


Welcome @shriram2301 nice clean update.



Thanks @Josh :smiley:


Thanks @neo - enjoying it already :smiley:


Thanks Maidsafe devs for all your hard work.

Congrats @Nadia :champagne:

Welcome @ shriram2301 (don’t disturb devs) :sweat_smile:

:clap: absolutely LOVE THIS



Good job Maidsafe !!!


Cheers @19eddyjohn75