A detailed illustration. In the centre, a Willow emblem: a stylised drawing of a Willow’s branch tipping into a water surface, next to a hand-lettered display of the word "Willow". Connected to this emblem with dashed lines are various networks. In the top left, a network of computers being used by Alfie and Betty. On the right, Gemma, Epson, and Phoebe are networking with handheld devices. In the bottom left, Lemmy is crouched behind a server, trying to fix it. Below, Dalton heaves an enormous USB stick around. In the bottom right, Bip and Bop chat with each other. And at the top, a frustrated Numpty is unable to connect with anyone.

Peer-to-peer protocols which scale up, down, and sideways.

  • Works offline.
  • Store any kind of data.
  • Destructive edits.
  • Real deletion.
  • Fine-grained permissions.
  • Encrypted.
  • Private networks.
  • Public networks.
  • Live networking.
  • Sneakernets.
  • Rust implementations.
  • Free forever, in every sense.

Willow

EmblemSynchronisable data storage with destructive editing.

  • Works offline.
  • Store any kind of data.
  • Truly destructive editing.
  • Actually delete stuff with prefix pruning.
  • End-to-end encryptable.
  • Eventually consistent.

Meadowcap

EmblemA capability system for fine-grained access control

  • No central authority needed.
  • No assumptions about what an identity is.
  • Owned namespaces for top-down moderation.
  • Communal namespaces for bottom-up networks.

W.G.P.S.

EmblemPrivate and efficient synchronisation

  • Encrypted communication.
  • Only syncs what you're interested in.
  • Only syncs what others have access to.
  • Man-in-the-middle attack resistant.
  • Streaming sync.
  • Dainty bandwidth and memory usage.

Sideloading

EmblemSecurely deliver data by any means possible.

  • Package Willow data in a single encrypted file.
  • Move it however you want.
  • Sneakernets.
  • Email.
  • FTP servers.
  • Messaging apps.
  • Dead drops.

In a nutshell

An anthropomorphic computer smiles and shrugs while a series of comical connectivity issues threaten its ethernet cable: a mouse nibbles through the cable, an axe chops it up, and an anvil falls toward it at high velocity.Data storage which never goes offline. You get always-available storage for arbitrary data (e.g. text, images, audio, video). You can have as many of these stores as you want, keyed to different namespaces. When stores from different devices belong to the same namespace, they deterministically sync with each other.

A cartoonish troll tries to spy on a person enjoying themselves with a paper airplane, but a solid brick wall blocks the troll’s line of sight. The trool is deeply unhappy about this circumstance.Private and end-to-end encrypted. Other users can't find out what you’re interested in unless they already know about it themselves. And if they get that far, they still have to be able to decrypt synced data to make any sense of it.

An envelope with a Willow-flavoured file inside. A Willow-flavoured USB stick. A bird carrying a Willow-flavoured file.Exchange data in whatever way suits you using sideloading. Go completely off-grid with USB keys and dead drops, or send packages of data via your favourite existing infrastructure. All completely encrypted.

Three stylised paper files hang off a tree branch. The branch is being cut off near its base by a pair of hedge clippers, in a way that all files will be pruned of the tree.Total erasure of data. Distributed systems use tombstones communicate deletes, but even these leave metadata behind. Prefix pruning deletes many entries and all of their metadata in their entirety, leaving a single tombstone in their place.

Two stylised admission tickets. One says "Admin", the other says "Aug 1st to Sep 3rd".Fine grained capabilities. Restrict read and write access by semantically meaningful areas of data, and choose the right kind of community topology for you with Meadowcap.

A cake with a single slice being removed. The selected slice has a strawberry on top. Hmm, strawberry cake...Partial sync. Have a lot of data, but don't want to sync the whole thing to a particular device? Choose which data to replicate by what, when, or who.

A pencil overwriting a sequence of bits (zeros and ones), leaving no trace of the overwritten bits.Destructive edits. When you update a value, the old values and associated metadata are overwritten.

A cartoon foot cartoonishly kicking a cartoon file out of a cartoon door.Locally delete data you don’t want to store, even if it was authored by someone else.

Five ants carry zeros and ones off to the right. The numbers are about as large as the hard-working insects.Peers can communicate resource budgets, so devices with very limited memory can sync too.

The pronoun "I", followed by a heart, followed by two crossed-out names of hash functions ("MD5" and "SHA256), followed by the hash function of choice: "BLAKE3".You choose the transport and cryptographic primitives suited to your use-case. Or use our secure and efficient set of recommended parameters.