Our technology has been mature. If there are some guys who want to join OUR TEAM(DEV OR PR),Please contact us(PM).Introduction of Decentralized Virtual Private NetworkIn order to make it convenient for investors to have an intuitive understanding of this network, our group will write this introduction in the structure of questions and answers; instead of making presentation in the form of thesis or white book with obscure words.
Q: What is Decentralized Virtual Private Network (DVPN)?A: DVPN is based on the Bitcoin Protocol and the original traditional VPN(Virtual Private Network).so, it is a decentralization Virtual Private Network.
Q: What are the differences between DVPN and the traditional VPN?A: 1. The traditional VPN network is only a closed virtual network, which can not see the outside while the outside world can not see it. However, this network can see the outside world. Therefore, it is an enchantment formed on the traditional Internet (blessed spot, the forbidden kingdom? Kunlun fairyland?), in which people can see the whole outside world. But the outside world can not see it because it is invisible.
2. Compared with the traditional VPN network, DVPN based on Bitcoin Protocol is more secure. It is more secretive about data transmission. Instead of using the traditional validation method of username and password, it adopts the username and password dynamically generated by the block chain to validate users. As to the users, they don’t need to remember this password and username. In addition, the network applications constructed in DVPN network are more secure compared with traditional VPN. Users can set the access ways freely and all these are anonymous. Compared with the traditional VPN network, it is an anonymous and invisible network.
Q: Network structure?A: In addition to the two bases mentioned above, this network also adopts TCP/IP protocol, SPI protocol, IPJOIN (mixed IP function, a kind of IP “friends-making” function, which is invisible and initiated by the group), P2P PROXY (agent), SOCKET agent (mapping), HTTP, HTTPS.
Q: What are the functions of DVPN?A: 1. In this network, the traditional network services can be all moved to this network.
2. We have provided a unique domain name system for this network. The basic domain name is http:// wallet address. Through the search function, any word, phrase or traditional domain name suffix can be used to point to this basic domain name. Taking Google for example, google.com can point to http:// wallet address through search and lead to the specific website. This is a subversive function.
3. Due to the unique characteristics (P2P) of this network, we have developed a decentralized VPN agent service trading platform in this network. Any enterprise, organization, department or individual can establish a server on this platform for own use. They only need to pay for the rent of the server without purchasing any other software. And we will not charge any other fee. Staffs in enterprises only need to install the WALLET.DAT file onto the U Disk to get access to the operation and management of the internal network without regional limitation. At the same time, they can establish servers for rental service, such as the currently popular P2P trading platform. This service can subvert the current online proxy industry and greatly reduce the operation cost of the industry.
Q: Why the traditional network should be moved into this network?A: First of all, it is a new internetwork, as well as a personalized internetwork. In our opinion, personalized internet is the future trend of development. This network has strong prospectiveness and we are taking the initiative in this industry.
Secondary, since it is a new network. In summary, it brings new things and new markets.
Thirdly, in this network, the operation cost is much lower than the traditional Internet, with higher efficiency. It is free of domain name, public IP, and record. In addition the server can be an inner network. This will eliminate a large portion of the shackles of traditional network. There is no hindrance in this network.
In addition, compared with traditional Internet, it is more secure, because in this network, the attack cost will be higher. For example, DDOS attack is not so easy, which needs the procedure (wallet system) to enter this network. What if it is installed on each computer? Even though, we also have countermeasures, namely the so-called micro payment. I will elaborate the payment system in the network later.
Q: How to realize the P2P decentralized VPN service trading center?A: We adopt the Bitcoin Protocol and carry out IPJOIN for the IP in the network, enabling users who are willing to provide VPN services to present their services in the platform center, thus forming a service market for users to choose services freely. As to the settlement of costs, we adopt a decentralized and automatic settlement system without personal information registration and runtime package (not real-time, in other words, it is charging no matter whether the users are using the services or not. We make a choice between runtime-package and real-time). This platform plan is a free system, as well as a public service system. We don’t need to involve too much at later stage.
We also endow a credit evaluation system for this platform, letting users to judge the quality of the services. This credit system can not be decentralized, because it needs a set of private server. Therefore, we are hesitating whether to open or not.
Later we will also promote the P2P agent, which needs no public IP. For example, input: http:// wallet address/www.XXXXX.com, and users can surf the corresponding websites. In a word, I can get on the net, but you can’t. But you can get on the net through me. This is an extremely personalized service system.
Users can get access to any website freely.
Q: How to realize the function of domain name?A: 1. Input the basic domain name through the browser: http:// wallet address, to get access to the website. It needs no public IP. Is it another way to solve the world IP problem?
2. Through the search center, input words or phrases, such as Google, or google.com, or I love Google. If the service provider has been bound to the basic domain name, it will jump to the website. Is it another Google?
3. This is an infinite domain name system, including all human languages. It is a system without boundaries, hindrances and DNS analysis. The realization of detailed technology will be announced on optional machines after network announce.
Q: What is the payment system in this network?A:1. In this network, we have created a VPNCOIN based on Bitcoin as the currency in circulation and the intermediary. The initial quantity is limited, 100 million for example. In the future 200 years, the inflation will not exceed 50%.
2. All the services in this network will be changed with this VPNCOIN.
3. Considering its limited inflation, this VPNCOIN will continuously appreciate with the increase of services and users in the network.
4. This VPNCOIN can be cashed in all the trading platforms all over the world.
5. The above - mentioned micro payment defensive attack refers to that if you visit a certain website with a default payment of 0.000001 VPNCOIN, then the attack is extremely time-consuming, energy-consuming and cost-consuming. Of course, the defense system in traditional network is also applicable in this network. Therefore, on this point only, it is more secure than the traditional network.
6. The prices of services for charge on the network can be set freely. And visit and login are available only after payment.
Q: What distinguishes this network from the foreign TOR and I2P?A: 1. TOR and I2P are the dark networks created by foreigners as well as the two personalized networks currently existing in the world. The American government invests a large amount of money in these two networks every year for national security. Their technologies and functions can be found on the Internet, so we will not introduce here.
2. This network is created by chinese people. If it can be widely promoted, we are winning glory for our country and achieving a situation of tripartite confrontation of these three networks, with domestic people occupying a space.
3. Of course, this network may be affected by the national policy. It will be the best if the country can use it well as a tool. If not, it doesn’t matter because this network has no regional limitations. For governments of all countries, there may be a familiar period and an acceptance procedure of the appearance of a new Internet. It is just a matter of time.
4. As to the specific differences between this network and the above two networks, we have mentioned more or less in the above questions and answers. Please take your actions to discover its specific functions.
5. The portal (South Gate to Heaven? Jade Pool?) connecting this network and the traditional Internet is the wallet system of VPNCOIN, with which you can own two worlds.
6. In our opinion, the appearance of the personalized network is an inevitable trend, as well as a fashion. Maybe we will suffer from ups and downs in this wave, but as long as we have made this choice, just march forward courageously!
Q: The economic model?A: Internet belongs to the service industry, so does this network, including innovation, service and payment. As to the reason why to move, it has been more or less mentioned in the above questions and answers already. To sum up, it includes security, cheap, high efficiency, low threshold, invisible, anonymous, personalized, trend.
2. As to its profit pattern, hereby we only mention a few keywords, hoping someone can understand: a certain free anti-virus software, words and phrases, port, circulation, portal, etc. It has considerable profits and can be expanded.
Q: Specific functions?A: All types of websites and large games, internal virtual network of enterprises and groups, personal P2P agent, traceless P2P instant messaging and file transferring. For more functions, please explore by yourselves. We will continuously improve the performance of this network and we welcome all the geeks in the world to make innovations in this network.
Q: Market promotion and prospects?A: Because this network is born without regional limitations, it has strong penetrability and survival ability. So our plan is to introduce investment and social resources at the earlier stage and then promote to the whole world.
2. We also want to learn FACEBOOK and promote from all universities.
3. It has unlimited prospects.
chinese thread :1:
https://bitcointalk.org/index.php?topic=753402.0 2:
https://bitcointalk.org/index.php?topic=753425.0old english thread:
https://bitcointalk.org/index.php?topic=705446.0VIDEO:
NO.1
YOUTUBE YOUKUNO.2
YOUTUBE YOUKUif you have some questoins,please submit at here.we will reply one by one.thank you.The 1st:
1.P2P domain name system,can use any human text. the domain name system Can be used with the Traditional domain name system,so your website can be used in two world At the same time and same server.
2.P2P Remote proxy,different from the Traditional Two layers of proxy.
3.P2P decentralized VPN agent service trading platform,Automatic payment.
4.Use more Internet technologies in combination with bitcoin technologies to realize the darknet and the Since the media.
5.realize the network interconnection between coins and coins.
6.realize P2P Virtual network business platform.