application logic happens on devices within the user’s control and their data is stored without them needing to trust another party
data is cryptographically protected on devices within users’ control
as little reliance as is possible and practical on external sources for capabilities
prioritizes interoperability of capabilities and data portability for the user’s benefit
Compared to cloud computing, leaf computing is:
Learn more: