diff --git a/docs/_blog/announcing-vss.md b/docs/_blog/announcing-vss.md new file mode 100644 index 00000000..de6205e7 --- /dev/null +++ b/docs/_blog/announcing-vss.md @@ -0,0 +1,180 @@ +--- +title: "Announcing Versioned Storage Service (VSS)" +description: "The Versioned Storage Service (VSS) provides a server-side storage solution for non-custodial mobile, web and hosted wallets." +date: "2025-03-17" +authors: + - Gursharan Singh +tags: + - VSS + - Mobile + - Storage + - Self-custody +--- + +The Versioned Storage Service (VSS) provides a server-side storage solution for non-custodial mobile, web and hosted +wallets. VSS significantly simplifies the wallet development process by offering a reliable, secure, and robust +framework that stores and manages the various forms of state data required for the Lightning Network (LN) and Bitcoin +applications. + +# What Is VSS? + +VSS is a client-server storage framework for Lightning Network (LN) and Bitcoin wallet data. VSS primarily serves two +core functionalities: + +- Recovery: VSS enables the restoration of states and wallet access, helping users regain their funds and control even + in scenarios of device or data loss. +- Multi-device Access: While this isn’t available now, future phases will allow the same wallet app across multiple + devices to securely share and access the LN state, leading to consistent access to funds. + +Clients can also leverage VSS for general application metadata storage including payment history, user metadata, and +more. + +# Why VSS? + +VSS aims to lower the barriers to high-quality LN wallet development. Wallet builders can host the VSS service in-house +for straightforward interaction with the service or use reliable third-party VSS providers, if available. + +VSS was designed with privacy in mind, offering features such as client-side encryption, key-obfuscation, and robust +authorization. It also ensures data and version number verifiability, and will support multi-device access in the +future. The software ensures modularity for seamless integration with different storage backend technologies. +Additionally, VSS can work with various applications with different key-level versioning and data-integrity mechanisms +and even allows disabling versioning for single-device wallet usage. + +### Why do we need VSS as primary storage for lightning wallets? + +Keeping VSS in sync with the latest Lightning state isn’t optional; if the server’s version lags and the user loses the +device, there is a risk for funds loss. That’s why VSS-powered wallets must be designed to hold off advancing the +lightning state until everything’s securely updated on the server. + +The on-device state of a Lightning wallet changes every time a user sends or receives payments. While some backup +options offer frequency-based backups, these can lead to data being out of sync and do not ensure full funds or channel +recovery if the device is lost. Protocols that sync asynchronously based on intervals inherently have insufficient data +for complete recovery by design. + +Using VSS as the primary storage ensures that every state change is securely stored in real-time, enabling full recovery +of funds and channels regardless of device loss. + +
+ VSS High Level Data Flow (Simplified) +

VSS High Level Data Flow (Simplified)

+
+ +# Customization + +While VSS can be readily used, it is intended to be customized based on specific requirements. For example, clients +might need to implement custom authorization, encryption, or backend database integration with different cloud +providers. With the accurate facilitation of the API contract, wallets can easily switch between different instances of +VSS. For example, a wallet can easily switch from VSS-Provider-A to VSS-Provider-B by just downloading the whole state +and uploading it to the new provider. + +By default, VSS incorporates a PostgreSQL implementation and can be hosted on preferred infrastructure/cloud providers +such as AWS, GCP, and others. Its backend storage can be interchanged with other implementations for KeyValueStore if +necessary. + +# Usage + +### Using with LDK Node: + +[LDK Node](https://github.com/lightningdevkit/ldk-node) can be easily configured to run with VSS as primary storage. It +is integrated in LDK Node (written in Rust) using [VSS-rust-client](https://github.com/lightningdevkit/vss-rust-client), +and there is also support for other languages such as Swift, Kotlin and Python +through [UniFFI](https://mozilla.github.io/uniffi-rs/) bindings. + +```rust +use ldk_node::Builder; + +fn main() { +let mut node_builder = Builder::new(); + ... + // Note: store_id can be freely set by the user and is useful for creating separate namespaces within storage. + // However, it must remain fixed for the entire life of the node as it is used for database storage. + let node = node_builder + .build_with_vss_store_and_fixed_headers( + vss_endpoint, + store_id, + HashMap::new(), + ) + .unwrap(); + + node.start().unwrap(); + ... + ... +} +``` + +### Using with Other Applications + +VSS is designed to store application-related metadata. Clients can use +the [VSS-rust-client](https://github.com/lightningdevkit/vss-rust-client) directly for this purpose. This can help +provide a complete user data recovery solution for applications, as well as enable turn-key multi-device support in the +future. + +### Hosting + +VSS can either be self-hosted or deployed in the cloud. If a service provider is hosting VSS for multiple users, it must +be configured with **HTTPS**, **Authentication/Authorization**, and **rate-limiting**. + +Application/wallet vendors can choose to either self-host VSS instances or use one of the existing hosted VSS providers. + +### Authentication & Authorization + +Currently, the VSS-server supports [JWT](https://datatracker.ietf.org/doc/html/rfc7519)\-based authentication and +authorization, and can run without authentication for local testing or in trusted setups. The VSS-rust-client supports +LNURL-auth & JWT based authentication and authorization. Switching to simple HTTP header authentication is +straightforward by adding another implementation. Note that the security of authentication heavily relies on using HTTPS +for all requests. + +### Scaling + +VSS itself is stateless and can be horizontally scaled easily. VSS can be configured to point to a PostgreSQL cluster, +and further scaling considerations need to be addressed in the PostgreSQL cluster. + +# Project Status + +VSS execution is split into two phases: Phase I prioritizes recovery and single-device use, whereas Phase II covers +multi-device use. Phase I is ready to use and integrated within [LDK Node](https://github.com/lightningdevkit/ldk-node). +Phase II will be subject to monitoring for demand from wallets and may slip to a later date. Refer +to [LDK-Roadmap](https://lightningdevkit.org/blog/ldk-roadmap/#vss) for more details. + +# Implementation + +Currently, the VSS server has Java and Rust based implementations and is ready to use. +[VSS-rust-client](https://github.com/lightningdevkit/vss-rust-client) is a Rust-based client with support +for client-side encryption, key obfuscation, retry mechanisms, and LNURL-auth. VSS is also integrated starting +with [LDK Node](https://github.com/lightningdevkit/ldk-node) v0.4.x as alpha support. + +# Future + +In the future, LDK and VSS will introduce multi-device support. This will enable users to seamlessly access the same +Lightning node across multiple devices. + +With synchronized updates and real-time access, users can manage their Lightning wallet from any preferred device, +enhancing convenience and accessibility while maintaining consistency across platforms. + +# Conclusion + +In summary, VSS provides an open-source, server-side cloud storage solution optimized specifically for non-custodial +Lightning/Bitcoin wallets as well as auxiliary application storage needs. Its key features include multi-device access, +recovery capabilities, user privacy protection, and data verifiability. With VSS, wallet developers can focus on +creating innovative Lightning wallets without the extra burden of crafting +complex [live backup storage](https://lightningdevkit.org/blog/the-challenges-of-developing-non-custodial-lightning-on-mobile/#live-backups) +solutions from scratch. + +# Resources + +1. [vss-server](https://github.com/lightningdevkit/vss-server) : A java and rust implementation of VSS server with + PostgreSQL as default storage backend. + +2. [vss-rust-client](https://crates.io/crates/vss-client) : A rust client for VSS, with in-built support for retries, + client-side encryption and custom auth mechanism. + +3. [LDK Node](https://github.com/lightningdevkit/ldk-node/blob/f1fdee50d5a8b628040fb2d584a7c4b831090de4/src/builder.rs#L441-L557) : + VSS is integrated with LDK Node and currently has alpha/experimental support. + +4. Bindings: On the client side, VSS is also usable with existing LDK Node bindings in Kotlin/swift/python. + +# Support + +If you encounter any issues or have questions, feel free to open an issue on +the [GitHub repository](https://github.com/lightningdevkit/vss-server/issues). For further assistance or to discuss the +development of VSS, you can reach out to us in the [LDK Discord](https://discord.gg/5AcknnMfBw) in the `#vss` channel. diff --git a/docs/assets/vss-data-flow-simplified.png b/docs/assets/vss-data-flow-simplified.png new file mode 100644 index 00000000..631dcedc Binary files /dev/null and b/docs/assets/vss-data-flow-simplified.png differ