This is really Impressive.
I have 2 questions on the security:
- How do you plan to protect the IPFS node?
- If a hacker gets access to the IPFS node (shown in the example diagram), the actual data will be available to the hacker. Since Gravity IPFS only checks the hash signed by the actual data, will the hacker not be able to replicate the hash (unless there is a time-stamp involved) & claim ownership?
The actual data on the IPFS node is closed by the AES-256 password which only the content owner knows.