Stores Actors Data Tree Downloads
AnalysisEncryption vs. access control lists (ACLs)

Encryption vs. access control lists (ACLs) draft

Perhaps call this whole section "Access model", show how the access model works (perhaps with a schema), then compare it to ACLs.

Condensation's access model is based on encryption rather than ACLs. Instead of restricting access through a set of rules, access is restricted through encryption.

This has several advantages: