From dbfbdc47b0c81a586a2799aa5cd15e1253f43105 Mon Sep 17 00:00:00 2001 From: "Alexey A. Leonov" Date: Sat, 27 Jan 2024 10:14:37 +0700 Subject: [PATCH] removed excess characters (#324) --- app/support/faqs/page.md | 12 ------------ 1 file changed, 12 deletions(-) diff --git a/app/support/faqs/page.md b/app/support/faqs/page.md index 970fc3daf..94b878fcd 100644 --- a/app/support/faqs/page.md +++ b/app/support/faqs/page.md @@ -36,8 +36,6 @@ cd ~ {% /callout %} -## - ## How do I upload a file? You can upload your first object by following our documentation [](docId:R8xZNlt1dr3nZzo-_ZQLx). @@ -68,8 +66,6 @@ e.g. `https://link.ap1.storjshare.io/s//my/path` Please, think twice before using the described method above - it exposes your access grant. If you would like to use this method anyway, then make sure to limit the access as much as possible. Ideally - read-only with time duration and only to one or two objects/paths, not to the whole bucket! {% /callout %} -## / - ## Can I use Storj DCS for web hosting? The Storj DCS service allows you to **host static websites** along with multimedia streaming, large file distribution, and other web-delivered assets. @@ -84,16 +80,12 @@ There are a few ways you can host your static site on Storj DCS. We recommend us **Dynamic websites** use server-side processing to generate the underlying code behind each page. They support Create, Read, Update, Delete operations against a database. Web views can be custom rendered to each user. {% /callout %} -## - ## What happens if nodes go offline? When your data is uploaded, each object is encrypted, then broken into 64 MB Segments, then each Segment is erasure coded, meaning it's broken into 80 pieces, of which only 29 are required to reconstitute an object or segment. Each of those 80 pieces is then uploaded directly, peer-to-peer, to statistically uncorrelated storage nodes. The erasure coded redundancy means that 51 of those nodes (operated by different people, in different locations, with different power supplies and internet connections. If too many nodes fail or leave the network, the network can repair the missing pieces. You can learn more under Concepts for [](docId:CBMEVO2vA2lDZ_BVuZ9aP) and [](docId:z4JgCuivlGbnn4YQMmlVX). -## - ## How are encryption keys managed? Storj DCS is a secure and private object storage service. While there are several different ways to interact with the service, including an S3 compatible gateway, CLI, developer library and tools like FileZilla, Rclone, Restic, Duplicati and more, you are responsible for keeping your encryption keys safe. @@ -150,8 +142,6 @@ For some sample Go code around access-restriction, check out: