Data-at-Rest refers to all data in computer storage. It excludes data while it is moving across or within a network and it excludes data that is temporarily residing in computer memory. Data-at-Rest refers to data that is actively being accessed within the computer storage, data that is archived (i.e., backups), or reference data that change rarely or never.
Here are some specific, traditional examples of Data-at-Rest:
Businesses, government agencies, and other institutions are concerned about the ever-present threat posed by hackers to data at rest. In order to keep data at rest from being accessed, stolen, or altered by unauthorized people, security measures such as data encryption and hierarchical password protection are commonly used. For some types of data, specific security measures are mandated by law.
Within DIDOs, Data-At-Rest refers to data actually residing on the Nodes in the Blockchain, Distributed Ledger Technology (DLT), Directed Acyclic Graph (DAG), InterPlanetary File System (IPFS), etc. However, not all Nodes have the same data. For example, a Pruned Node has less data than an Archival Node. An Archival Node has more data than a Lightweight Node (Wallet). Regardless of the specific data or the quantity of data, once it is distributed onto the nodes it is classified as storage.
Within Ethereum, data at rest is labeled Storage within Solidity and represents two 32 byte values. One represents the Key for the Storage, while the other represents the data value associated with the key. As a general rule, the key value is an address within the Node Network.
Within a DIDO, Data-At-Rest is generally physically available to anyone having access to the Node. Depending on the Network Access Control, the risk can vary. In a Private Network there is obviously less risk than there is in a Public Network; however, this depends on the Securability of every Node in the Node Network.
It is best to assume there is
Cryptocurrencies, when viewed as a surrogate for DIDOs in general, have been regarded with a fair level of suspicion by governments including: India, China, the US, and Europe1).
As evidence of the non-anonymous nature of Cryptocurrencies, the United States just filed a Civil Action suit to return $150M in embezzled funds from Sony by tracking money to Bitcoin2).
[char][✓ char, 2022-03-17]New section - review