Уважаемые пользователи Голос!
Сайт доступен в режиме «чтение» до сентября 2020 года. Операции с токенами Golos, Cyber можно проводить, используя альтернативные клиенты или через эксплорер Cyberway. Подробности здесь: https://golos.io/@goloscore/operacii-s-tokenami-golos-cyber-1594822432061
С уважением, команда “Голос”
GOLOS
RU
EN
UA
namduong43
4 года назад
tachyon

Review Tachyon Protocol - Democracy, Privacy, Security, High Speed. A great project!

Hello everyone, have a nice day and good work!
As you know, blockchain technology brings a multitude of projects, utilities, and coins ... However, among them, more than 90% of projects cannot reach the goal. spend or fail during startup.
For this article, I want to introduce to you a wonderful project called Tachyon - Tokenize the Protocol with 50 Million Users!
image.png

First, let's talk about the blockchain protocol! It is "an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way". For use as a distributed ledger, a blockchain is typically managed by a peer-to-peer network collectively adhering to a protocol for inter-node communication and validating new blocks.
image.png

What is Tachyon Protocol?
Tachyon Protocol is a decentralized network stack combining decentralization and encryption
techniques; it is designed to reconstruct the TCP/IP stack by means of decentralized structure,
end-to-end encryption, traffic concealing, multi-path routing, and multi-relaying scheme.
image.png

Tachyon is a collaborative project between two existing platforms. One is X-VPN, the popular VPN service provider that boasts over 50 million users, while the other is V SYSTEMS, a blockchain solution offering developers a platform to launch their Dapps. Together, these two companies have analyzed the failings of the current VPN and internet architecture, and they have come up with an idea that could win the prize.
image.png

Outstanding features of Tachyon Protocol

  • 200% faster in complex network conditions
  • 90% connection rate on weak network
  • 95% stability of the network
  • 200%~1000% faster than TCP/IP
  • Stay fully private
  • Multi-path routing for single-point attack
  • Multi-relay forwarding for MITM attack
  • Token for both trading and value
  • Advanced security for data protection
  • ECDHE-ECDSA asymmetric encryption
  • Protocol simulation to protect data
  • Add random data to disorganize data
  • Driven by DAO with stronger vitality
  • P2P network without central node
  • Everyone can participate in network construction and community governance
  • Clear incentives to ensure the vitality of the network
  • Unblock streaming & social networking
  • 9 tunnels to help you bypass filters and firewalls
  • Unblock streaming & social networking anywhere
  • Gain access to Facebook, Netflix, Spotify and other platforms
  • Easy setup
  • Standard API to easy integration with all blockchain
  • Support all popular languages & systems
  • Highly customizable modules

The Underlying Technologies of Tachyon’s Protocol
Tachyon Booster UDP (TBU)
Tachyon claims that its TBU, the transport layer that implements blockchain technology, DHT, and UDP, is 200% to 1000% faster than conventional protocol suites. It enables a 90% connection rate on a weak network with 95% stability, regardless of how complex the network environment is.
Tachyon Security Protocol
This protocol offers ECDHE-ECDSA end-to-end encryption simulation to protect the personal data of users. To do this, it inputs random data to hide the content of messages from prying eyes. Similarly, this protocol executes some of blockchain’s security features, like the use of public and private keys for decrypting information.
Tachyon Anti-Analysis
This feature preserves the anonymity of users by introducing multi-path routing. This is another way of saying that a piece of information is segregated into different IP packets and then sent in multiple paths. It also implements multi-relay forwarding to circumvent man-in-the-middle attacks.

Why Tachyon Protocol?
TCP/IP Security Vulnerabilities and Low Efficiency

  • Application Layer HTTP:
  • HTTP lacks security, vulnerable to penetration & hijacking.
  • TLS has high deployment costs and learning costs.
  • Transport Layer TCP: The TCP three-way handshake mechanism and congestion control mechanism would result in both bandwidth and time wastage.
  • Internet Layer IP: IP addresses are often tied to the physical address and can be easily traced.
  • Data Link Layer Ethernet:
  • Bus topology posses congestion issue when collisions occur.
  • Star topology cannot afford central hub failure as it would cause the network inoperable.
    Trust Issues with the Centralized VPN Providers
  • Privacy Policies are nothing but plain statements.
  • User data had been sold by VPN providers on multiple occasions.
  • Centralized VPNs make compromises when comes to retention laws & data requests.
  • Network stability cannot be guaranteed thus the speed varies.

Tachyon Security Protocol
image.png

  • End to end ECDHE-ECDSA encryption, relay nodes won't be able to intercept the messages
  • Conceal IP packet and simulate UDP, TCP, HTTP, HTTPS, FTP, SMTP traffic
  • SMTP simulation: The traffic will appear to be sending Gmail
  • HTTPS simulation: The traffic will appear to be visiting YouTube

Tachyon Protocol Use Cases

  • VPN: Tachyon VPN will bring ultra cost-effective blockchain solutions that ensure advanced cybersecurity and privacy protection directly to all users.
  • CDN: As a content distribution network, CDN network has advantages in the number and distribution of edge nodes and the speed of network synchronization. The decentralized Tachyon network distributes tens of millions of nodes around the world so the quantity and coverage exceed the centralized CDN service.
  • Decentralized Storage: Tachyon protocol can add an extra layer of protection by encrypting the contents in storage and during transmission, as well as accelerate the transmission efficiency.
  • DeFi: It uses the blockchain technologies and smart contract to form a machine & algorithm-based trust to replace the human agents and third party-agencies with a goal to provide a transparent, efficient and low-cost financial system.
  • IoT: As an important part of the new generation information technology, IoT has been widely used in various industries, such as smart home, internet of vehicles, industrial manufacturing, environmental monitoring, environmental sensors, etc.
  • DNS: An important and ubiquitous function of DNS is its central role in distributed Internet services such as cloud services and content delivery networks. It is able to actively promote or almost completely block any website.

Roadmap
image.png
Team Members
image.png

Project is very good . I am sure this project later when launching will be a lot of its enthusiasts because this project has a solid team structure and trusted.
Learn more about Tachyon Protocol:

Author: TRANTHITHOMAI
Bitcointalk profile URL: https://bitcointalk.org/index.php?action=profile;u=2716273

tachyonblockchaincrypto
270
3.064 GOLOS
На Golos с July 2019
Комментарии (3)
Сортировать по:
Сначала старые