Core Concepts
Understanding the technical foundations that make Continuata's distribution platform reliable and efficient.
Content-Addressed Storage
Traditional file storage uses human-readable names that can change or conflict. Content-addressed storage uses the file's cryptographic hash as its identifier, creating several powerful benefits:
How It Works
- When you upload a file, Continuata calculates its SHA-256 hash
- The file is stored using this hash as the key (e.g.,
a3c2b1...) - Multiple files with identical content share the same storage space
- File integrity can be verified by recalculating the hash
Benefits
- • Automatic deduplication
- • Tamper detection
- • Efficient delta updates
- • Immutable references
Use Cases
- • Sample library versions
- • Plugin distributions
- • Software updates
- • Asset collections
Delta Updates
When you release a new version of your product, users only download the files that have changed. This dramatically reduces download times and bandwidth usage.
Example: Sample Pack Update
In this example, the user downloads only 3 files instead of 5, saving 40% of the bandwidth and time.
Cryptographic Verification
Every file and chunk includes SHA-256 checksums to ensure perfect data integrity throughout the download process.
Manifest Signing
The manifest file listing all content is cryptographically signed to prevent tampering.
Chunk Verification
Each 4MB chunk is verified against its expected hash before being written to disk.
File Assembly
After all chunks are downloaded, the complete file hash is verified against the manifest.
Corruption Handling
If any chunk fails verification, it's automatically re-downloaded. Corrupted data never reaches the user's filesystem.
Browser-Native Downloads
Continuata runs directly in modern web browsers without requiring users to install additional software.
File System Access API
Modern browsers support direct file system access, allowing native-like folder selection and file writing.
Chrome/Edge
Full native support
Safari/ Firefox
Bridge required
Origin Private File System (OPFS)
For browsers without File System Access API, Continuata uses OPFS as a staging area before allowing users to export files.
Continuata Bridge
A lightweight desktop companion app that provides native file system access for browsers that need it, particularly Safari and mobile browsers.
Manifest Structure
The manifest is a JSON file that describes your product's files, their hashes, and download URLs.
{
"v": 2,
"productId": "epic-drums-v1",
"version": "1.0.0",
"vendorId": "audio-company",
"totalSize": 2147483648,
"fileCount": 128,
"files": [
{
"path": "samples/kick_01.wav",
"size": 8388608,
"sha256": "a1b2c3d4e5f6...",
"chunks": [
{
"off": 0,
"len": 4194304,
"sha256": "chunk1hash...",
"url": "/api/chunk/audio-company/a1b2c3d4e5f6.../0"
},
{
"off": 4194304,
"len": 4194304,
"sha256": "chunk2hash...",
"url": "/api/chunk/audio-company/a1b2c3d4e5f6.../4194304"
}
]
}
],
"signature": "manifest_signature_here",
"expiresAt": 1640995200000
}Global CDN Architecture
Continuata leverages Cloudflare's global network for optimal performance and zero egress fees.
Edge Caching
- • 285+ cities worldwide
- • Intelligent cache warming
- • Automatic compression
- • HTTP/2 and HTTP/3 support
Performance Benefits
- • Sub-100ms latency globally
- • Automatic failover
- • DDoS protection included
- • No bandwidth charges
Progressive Enhancement
Continuata is designed with progressive enhancement, providing the best possible experience based on browser capabilities.
Best Case: Modern Desktop Browsers
Direct file system access, parallel downloads, real-time progress, automatic resume
Good Case: Mobile or Older Browsers
OPFS staging, ZIP export option, progress tracking, manual resume
Fallback: Legacy Browsers
Traditional single-file downloads with basic progress indication
Security Model
Multiple layers of security protect both content creators and end users.
Content Protection
- • Time-limited download tokens
- • IP-based access restrictions
- • Download count limits
- • Token revocation support
Data Integrity
- • End-to-end encryption in transit
- • Cryptographic verification
- • Tamper-proof manifests
- • Automatic corruption recovery
Ready to Implement?
Now that you understand how Continuata works, check out ourQuick Start Guide to upload your first product or explore platform integrations.