Explain me please how does your mail work?
VEDA’s technology is a combination of distributed registry, encrypted communication channels, token files and smart contracts.
VEDA’s technology is based on networks of VEDA – numerous VEDA clients running on nodes that compose VEDA’s blockchain. VEDA's customers are custom applications, and nodes, intended for generation and storage of distributed registry.
VEDA uses elliptic curve cryptography to ensure the confidentiality, authenticity, and reliability of all transactions. Each external account (Wallet account and Node account) is a pair of keys – private and public, and is associated with a changeable network state that is updated when transactions are confirmed by the network.
Step 1
Run the VEDA Mail Client application, get authorized in the network. Then create a document or type a message to be sent. Specify the address of the recipient's account. For each pair of subscribers the symmetric key with use of the Diffie-Hellman Protocol is developed. It is used to encrypt messages or to generate an electronic signature.
Step 2
The mail client encrypts the message’s body and adds it to the VEDA Token with a unique structure – a digital entity that is stored directly in the user's device. And in VEDA – it is a file that is stored in the crypto-container of its own implementation. In addition to tokens in crypto-containers, an SSL certificate and a private key of the account are stored on the user's device. Each token has its own unique identifier – VEDAID – VID.
Step 3
The PrivateMailVeda email client generates a transaction for the token transfer. A transaction is an electronically signed data structure that is transmitted over the VEDA network and placed in a DAG. Each new transaction contains the TID of the preceding transaction or transactions.
The token and the transaction are sent to random hosts (token and transaction are sent to different hosts in random order). Nodes can be custom power for the case of a public network or computing facilities of VEDA’s developers. • Copy of the chain is stored on G-Node and on all other nodes in VEDA network.
• When connected to the network, the user sends a certificate to the node along with the asymmetric encryption session key to verify identity and establish an encrypted channel.
• When receiving a certificate, the node first checks the signature and then searches for the SID (sertificate ID) in the SSL-certificate blockchain.
• If there was a request to register a new wallet, then in the case of a reliable signature and the absence of data about the certificate with such SID in blockchain, the sent certificate is placed in the certificate pool of the nearest G-Node.
• If there was a request for authorization of an existing wallet, then in the case of a reliable signature and the presence of data on the certificate with such SID in blockchain, the user receives a positive response and a secure communication channel is established. Otherwise, the user gets a negative response and looses connection.
Step 4
After the tokens are received by the host, they are stored in a special encrypted area – the crypto container.
Recieved transaction is placed in the pool for confirmation.
Step 5
After confirmation of the transaction by the network nodes, in the course of consensus, the account-recipient has the opportunity to pick up sent with a message, from the host on which it is stored. The accuracy of the transaction in the DAG is provided by the presence of transaction sender’s signature in it and a signature of the node that accepted the transaction. Each new transaction in a DAG holds the hash-sums of all its parents, which, in turn, contain the hash-sums of all its parents and so on.
Step 6
The account-recipient sends the request to the network and receives the token addressed to him.