The system is designed and implemented around the "principle of least authority" (POLA). Strict adherence to this convention is enabled by the use of cryptographic capabilities which grant the minimal set of privileges necessary to accomplish a given task to requesting agents. A RAIN array acts as storage — these servers do not need to be trusted for confidentiality or integrity of the stored data.
A patched Tahoe-LAFS exist (since 2011) made to run on the anonymous network I2P, with support for multiple introducers. There is also a build for Windows. It must be downloaded from inside of the I2P network. When I2P and Tahoe-LAFS are used together, the location of nodes is not known. This allows for anonymous distributed grids to be formed. In normal operation, the IP address of all the nodes is known to the introducers and any clients on the grid.
Lee, Changhoon. Secure and trust computing, data management and applications : STA 2011 workshops: IWCS 2011 and STAVE 2011, Loutraki, Greece, June 28 - 30, 2011. Berlin: Springer. pp. 192–193. ISBN3642223648.