This commit is contained in:
2024-06-23 22:17:49 +04:00
parent 3c9092d5bb
commit d9781aaff2
54 changed files with 342 additions and 162 deletions

View File

@@ -0,0 +1 @@
mycelium00.png

Binary file not shown.

After

Width:  |  Height:  |  Size: 512 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 386 KiB

View File

@@ -0,0 +1,7 @@
![](img/mycelium00.png)
## Mycelium: A New Network Layer for the Internet
!!wiki.include page:mycelium_innovation_short.md

View File

@@ -0,0 +1,25 @@
### The Problem
The current centralized state of the internet poses significant security risks, with compromised routers and growing cyber threats (trillions of USD per year now), making everyone vulnerable to hacking. Industry responses involve disabling original features, hindering true peer-to-peer connectivity and personal server capabilities. Workarounds and system hacks have become the norm.
**Our Internet is seriously broken. We need new ways to communicate**
### Introducing Mycelium
Mycelium is an overlay network layer designed to enhance the existing internet infrastructure while remaining compatible with all current applications. It empowers true peer-to-peer communication. By installing a Network Agent on your device, you gain the ability to securely connect with any other participant on this network. Mycelium intelligently reroutes traffic to maintain connectivity taking location of you and your peer into consideration.
### The Benefits
- **Continuous connectivity:** Mycelium ensures uninterrupted connectivity by dynamically rerouting traffic through available connections (friends, satellites, 4/5G, fiber).
- **End-to-end encryption:** robust encryption stops man-in-the-middle attacks, guaranteeing secure communication.
- **Proof of authenticity ([POA](p2p:poa.md))**: ensures that we know who we are communicating with
- **Optimized routing:** Mycelium finds the shortest path between network participants, reducing latency and keeping traffic localized.
- **Universal server capability:** empowers individuals to act as servers, a foundational element for any peer-to-peer system.
- **Full Compatibility:** Mycelium seamlessly integrates with the current internet, supporting any application.
- **Impressive speed:** achieves 1 Gbps per Network Agent, ensuring rapid data transfer.
### Status
In beta and usable from TFGrid 3.13, its our 3e generation approach to networking and took us years to do. We are looking forward to your feedback.

View File

@@ -0,0 +1,16 @@
# Network
| | ThreeFold Network Layer | Other Overlay Network Technologies (like VPN) |
|-----------------------------|-----------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------|
| Management | Full P2P, done by 3bot Agents, blockchain IT contract | Centralized leading to security issues |
| Locality | Find shortest path on latency and quality, this allows traffic to stay sovereign. | NO, based on centralized control mechanisms or inefficient algorithms that route traffic indiscriminately across the globe. |
| Encryption | End2End ecryption, unique for every relation, linked to private key | Normally based on key exchange, or pre-shared keys. |
| Post Quantum | Possible (ask us) | No |
| Scalability | Our aim is to be planetary scalable, but we need more exposure. | Bad |
| Compatibility | We aim to support mobile, desktop, IOT, ... | Depends, often not |
| Backdoors | NO, all is based on opensource | Often, yes, unfortunately. |
| Performance | Quite good, 1 gbit / sec can be achieved on std node (which is high for overlay) | Often slow. |
| Security Model | Whitelist model | Blacklist model, list who is bad e.g. firewalls |
| Fully integrated in compute | Yes | Lots of different solutions |

View File

@@ -0,0 +1,10 @@
![](img/network_wall.png)
## Network Wall
The Network Wall offers 100% separation between where compute workloads are and where services are exposed, proving an extremely high level of security.
!!wiki.include page:network_wall_innovation_short

View File

@@ -0,0 +1,20 @@
## The Problem
Traditional firewalls are increasingly ineffective at addressing modern security challenges. They struggle to mitigate emerging threats, particularly against backdoors and man-in-the-middle attacks. Backdoors can render firewalls obsolete as attackers find ways to bypass them. New and innovative approaches to cybersecurity are necessary to address these evolving security problems.
## Introducing Network Wall
Imagine a scenario where you deploy applications within secure, liquid-cooled physical containers or smaller POD's that operate without relying on traditional TCP/IP or Ethernet protocols. By avoiding the use of standard low-level protocols, the existing backdoors are unable to communicate with the external world.
Incoming traffic is intercepted at the application level and securely transported into the protected environment through physical communication mechanisms based on RDMA (Remote Direct Memory Access). The integration of this solution into Zero-OS ensures a seamless and transparent experience for developers and system administrators.
It's important to note that this solution is primarily intended for commercial use cases, but its existence is valuable knowledge in the realm of cybersecurity and network security.
## The Benefits
- **Enhanced security and privacy:** the solution offers significantly improved security and privacy measures, mitigating potential risks and vulnerabilities.
- **Ultra-fast connectivity:** within the POD/Container, connectivity is exceptionally fast, ensuring rapid data transfer and application performance.
- **Robust data and application aware proxies:** secure proxies between the Internet and the protected backend application provide an additional layer of security, safeguarding data and ensuring application-level awareness.
- **Seamless integration:** the solution is designed for ease of integration within existing environments, minimizing disruptions and complexities during implementation.