Will ZeroNet subvert the existing Internet network?

Will ZeroNet subvert the existing Internet network?

ZeroNet is a revolutionary P2P network based on Bitcoin encryption algorithm and BitTorrent content distribution protocol. It was created by Hungarian developers using Python and is completely open source. Another innovative thing that must be mentioned when talking about ZeroNet is BitTorrent. In the BT network, each access device is both a server and a client. In BT's P2P protocol, once the publisher's resources are downloaded by others, they will never disappear again. Others can download files from all nodes with this resource. It is said that Google has already used the Bittorrent protocol to update content across computer rooms.

  • What are the advantages and disadvantages of ZeroNet compared to traditional Internet networks?

Advantages: ZeroNet is a BT platform that provides uncensored networks and communications, ensuring the security of user communications and file sharing. With ZeroNet, you can surf the Internet anonymously, you can build a website on your computer, but even if you turn off your computer, your website still exists and others cannot shut down your website. The summary is as follows:

1. No need to file: You can build a website without notifying anyone.

2. No audit required: Your website will not be shut down

3. No server required: You don’t need to maintain a server for a long time to maintain your website

4. Ignore firewalls: It is more difficult for some organizations to stop you when you publish or access information

  • Disadvantages: As the number of ZeroNet increases, the amount of local data of ordinary users is bound to grow. In addition, the concepts related to Bitcoin such as private key addresses and backup-related knowledge are still the same as those required by ordinary WWW websites, and may be adopted by the servers of large websites in the future.

Although ZeroNet does not provide anonymity protection by default, users can use Tor browser to set up a proxy to achieve anonymity. Compared with the current Internet network, ZeroNet only needs to download a software to access the website through a special "ZeroNet URL". This special URL is 127.0.0.1:43110 followed by a 34-bit string like a Bitcoin wallet address, similar to the following,

  1. http://127.0.0.1:43110/1ML1BufvU2A1KPeg57LPgXSbX7j9gTUEuC/

The most important feature of ZeroNet is decentralization. It forms an Internet-like P2P distributed network based on a single visitor. Each visitor is a node, and each access device is both a server and a client, and is responsible for storing website content and providing transmission bandwidth. When visiting a website, the content of the website will be downloaded from the node containing the website to the local computer and kept updated synchronously. Then the local computer will become an output node of the website to provide services to the outside world, and each time the browser is opened, the local content is constantly updated. The more websites a visitor browses, the more website content is stored locally, and the more space is occupied. Therefore, the default content limit for a single website is currently 10MB, which is more suitable for personal blogs, forums, and BT seed file sites, but not suitable for video and large file storage.

The advantage of doing this is that all visitors are enjoying the resources provided by others, while you are also providing resources to the outside world. As the number of nodes increases, the access speed will become faster and faster, and the effect will even be better than the CDN service commonly used on the current network. Another advantage is that you no longer need a host or space to build a website. A ZeroNet blog or forum built locally, as long as someone has browsed it, others can continue to visit it after turning off the computer. You may worry that your website will be attacked maliciously, but you can rest assured that ZeroNet has sandbox protection, which means that you have full control over your website. If you find suspicious content, you can stop hosting the website at any time. Finally, and most importantly, freedom. This model allows websites to be created and disseminated freely, avoiding third-party censorship, and there is no risk of website closure.

Will ZeroNet replace the existing Internet network?

ZeroNet obviously cannot replace the current popular Internet model, but the concept of a P2P distributed network without a server is really eye-catching. The ZeroNet network uses Bitcoin's signature technology and BitTorrent's file distribution technology to provide an uncensored and secure network and communication platform, uses BitTorrent to discover nodes and synchronize website content, uses Namecoin (a Bitcoin-based P2P distributed domain name system) for domain name resolution, and uses Tor to achieve anonymity.

Plus, you don’t need to remember a password because your account is protected by the same encryption as your Bitcoin wallet.

To ensure the integrity of the files, when you visit a website, you download a file called "content.json" which contains all the other file names with relative hashes and cryptographic signatures by the website owner. You then download other files and verify them using the hashes contained in "content.json". This prevents the spread of corrupted files or malicious code to some extent.

Another feature is multi-user sites, for example if you want to publish on a forum or blog. Send your verification address to the site owner and it creates a new file with your verification address set as a valid signer. The site owner publishes a new "content.json" stating that you can sign files.

The functions implemented by ZeroNet are listed as follows:

  • Easy, zero-configuration setup
  • Passwordless BIP32 authorization: Your account is protected by the same encryption as your Bitcoin wallet
  • Real-time updated website
  • Namecoin .bit domain name support
  • SQL database support: allows for easier site development and faster page load times
  • Anonymity: Tor network supports .onion hidden services instead of ipv4 addresses
  • TLS encrypted connection
  • uPnP port automatically opened
  • Multi-user plugin (openproxy) support
  • Works with any browser/OS
  • ZeroNet users also have access to:
  • ZeroBoard: Simple message board demo for dynamic content distribution
  • ZeroBlog: Self-publishing blog demo
  • ZeroTalk: Decentralized, P2P forum demo
  • ZeroMail: End-to-end encrypted, distributed, P2P messaging site. To improve privacy, it uses a solution similar to BitMessage that does not disclose the recipients of messages.
  • ZeroChat: A finished website for creating a serverless, SQL-backed, real-time-updating P2P chat application using ZeroNet in less than 100 lines of code
  • ZeroMe: Decentralized, Twitter-like P2P social network

Although ZeroNet is not yet mature, it allows us to experience the decentralized P2P network in a new and simple way. It is a technological innovation and provides an additional option for the use of the Internet.

Comparison with Twitter

Twister is a decentralized social network. In theory, no one or organization can shut it down. Moreover, on Twister, other users do not know whether you are online, your IP address, or who you follow. This is a deliberate design to protect user privacy. Users can still use Twister to publish public information, but private information sent by users to others is encrypted and protected by the encryption method commonly used by LavaBit. LavaBit is the email service provider used by Snowden.

For a new application that is not controlled by a central authority and takes security very seriously, Twister has achieved remarkable ease of use. Other alternatives to Twitter and Facebook, such as Pump.io, Identica and Diaspora, require users to run their own servers or trust someone else to run a server. Twister is more like peer-to-peer file sharing software: run Twister, and it can connect to other users, without the need for a central server.

Twister uses the Bitcoin protocol, although it has no currency inside. This protocol is used to handle Twister user registration and login verification. Just like Bitcoin miners confirm each transaction to ensure that no one can double-spend and everyone can only spend their own coins, the network of Twister users' computers is used to confirm that a username is not registered twice and that the microblogs (posts) sent by users are indeed from that user.

The microblogs sent by users use the BitTorrent protocol, which allows the system to quickly and efficiently publish a large number of microblogs over the network, allowing users to receive new microblogs and information almost simultaneously, without the need for a centralized server.

But will anyone use a decentralized Twitter? Take a look at the screenshot below.

There is no administrator on the Twister network to censor or filter your speech! You don't need to climb over the firewall to use Twister. But once your message is published, it cannot be deleted!

<<:  TCP/IP based application programming interface

>>:  The existing network is difficult to achieve great success, will 5G be the savior of the Internet of Things?

Recommend

Let’s talk about 5G cloud dedicated line, do you understand?

[[424450]] A few days ago, I read an article abou...

VirMach: $7.2/year KVM-512MB/10GB/1TB/multiple data centers available

VirMach has launched the SUMMER HOSTSALE promotio...

What is a patch panel and what is it used for?

Patch panels are important network components tha...

Why do 5G mobile phones support more frequency bands?

How many 5G frequency bands a mobile phone can su...

ASUS releases PG27VQ gaming monitor: 165Hz, RGB light

RGB lights have now spread to every corner inside...

RongCloud's Yang Pan: Empowering Enterprises to Communicate

[51CTO.com original article] As an indispensable ...

Expert Viewpoint: Is it time to go wireless?

Regardless of any technical requirements, the adv...