馃敩
Whitepaper DEXNET
  • 袩袪袨袝袣孝
    • 袙袙袝袛袝袧袠袝
    • 袣袨袧袣校袪袝袧孝袧袨袝 袩袪袝袠袦校些袝小孝袙袨
    • 袩袗袪袗袛袨袣小 小袨袙袪袝袦袝袧袧袨小孝袠
    • 袩袪袨袘袥袝袦蝎 袠袧孝袝袪袧袝孝袗
    • 袠小孝袨袪袠携 小袨袟袛袗袧袠携 DEXNET
    • DEX NODE
    • 袩袪袝袠袦校些袝小孝袙袗 DEXNET
    • 袦袠小小袠携 DEXNET
    • 协袣袨小袠小孝袝袦袗 DEXNET
    • 袘袠袟袧袝小-袦袨袛袝袥鞋 DEXNET
    • 孝袨袣袝袧袨袦袠袣袗 DEXNET
    • 小孝袝袡袣袠袧袚 孝袨袣袝袧袨袙 DEXNET
    • IPFS 2.0 袗袩袩袗袪袗孝袧袗携 袪袝袗袥袠袟袗笑袠携 袩袪袨孝袨袣袨袥袗
    • 协孝袗袩蝎 袠袧孝袝袚袪袗笑袠袠 DEXNET
    • 小袝袪袙袠小蝎 DEXNET
    • 小袦袗袪孝-袣袨袧孝袪袗袣孝 孝袨袣袝袧袗 DEXNET
    • 孝袝袣校些袝袝 小袨小孝袨携袧袠袝 DEXNET
    • 袛袨袪袨袞袧袗携 袣袗袪孝袗
    • 袛袠小袣袥袝袡袦袝袪
    • 袩袪袝袛校袩袪袝袞袛袝袧袠携 袨 袩袪袨袚袧袨袟袧蝎啸 袟袗携袙袥袝袧袠携啸
    • 肖袗袣孝袨袪蝎 袪袠小袣袗
    • 袙蝎袙袨袛蝎
  • English version
    • INTRODUCTION
    • COMPETITIVE ADVANTAGE
    • THE PARADOX OF MODERNITY
    • INTERNET ISSUES
    • HISTORY OF DEXNET CREATION
    • DEX NODE
    • ADVANTAGES OF DEXNET
    • DEXNET'S MISSION
    • DEXNET'S ECOSYSTEM
    • DEXNET'S BUSINESS MODEL
    • DEXNET'S TOKENOMICS
    • STAKING DEXNET'S TOKENS
    • IPFS 2.0 HARDWARE PROTOCOL IMPLEMENTATION
    • DEXNET'S INTEGRATION STAGES
    • DEXNET'S SERVICES
    • SMART CONTRACT FOR DEXNET'S TOKEN
    • CURRENT STATUS OF DEXNET
    • ROADMAP
    • DISCLAIMER
    • FORWARD-LOOKING STATEMENTS WARNING
    • RISK FACTORS
    • CONCLUSION
Powered by GitBook
On this page
  1. English version

INTERNET ISSUES

The internet is an environment that connects personal computers, smartphones, servers, and IoT devices (physical objects connected to the internet and exchanging data) into a global information and communication network for data storage and transmission. The public internet exists thanks to the consolidation of data centers and providers, representing a centralized platform with physical and legal vulnerabilities.

Supporters of a decentralized network highlight three main issues with the modern internet:

1. Openness and accessibility.

2. Censorship and privacy.

3. Information archiving.

ABOUT OPENNESS AND ACCESSIBILITY

Centralization of the internet imposes certain limits on individuals and may deprive or restrict their freedom. For example, if you use iCloud by Apple to store your photos, you cannot grant access to it to a user of Microsoft OneDrive. These storage systems do not "communicate" with each other. By storing private information in cloud storage, you cannot guarantee that no one other than you will have access to your information. By placing information in centralized clouds, you agree that you are surrendering it to the corporation that owns that cloud.

ABOUT CENSORSHIP AND PRIVACY

Centralized web services allow companies to easily monitor your internet usage. Social media platform owners often make money by selling users' personal data, interests, and details of their lives. Fitness trackers and health monitoring apps store a large amount of users' personal and even intimate information. We create accounts on social networks and willingly provide them with our personal information, agreeing to their terms of service.

ABOUT INFORMATION ARCHIVING

The modern internet is ephemeral: information changes, websites are born and cease to exist. Very little data is retained and archived. Vinton Cerf, an American scientist in the field of computer science, often referred to as the "father of the internet," has termed this time the "dark digital age." When historians of future generations study this period, a vast amount of material on the internet will no longer exist, and records will not be preserved.

A good example of such loss is the company "Yahoo." First, they created the GeoCities website, and then they deleted it. Millions of user pages with their stories have been irretrievably lost.

To create a decentralized network, technologies are being developed, which you may already be familiar with. One of the key technologies supporting a decentralized network is the peer-to-peer (P2P) network. BitTorrent is based on this technology.

In P2P networks, information is distributed among thousands or millions of computers rather than being stored on a single server. Since the content of files or websites is distributed and decentralized, it becomes more difficult to shut down a website or delete a file unless you are the owner. This means that information uploaded to decentralized networks can be stored, creating archives of old information. Technologies such as cryptographic protection and blockchain provide a level of security that complicates tracking actions in these networks, making them very reliable. Together, these technologies can protect the privacy of internet users.

PreviousTHE PARADOX OF MODERNITYNextHISTORY OF DEXNET CREATION

Last updated 1 year ago