s
@ -1,20 +1,28 @@
|
|||||||
- [Introduction](tech/technology.md)
|
- [Overview](tech/overview.md)
|
||||||
- [The Internet Today](tech/internet_today.md)
|
- [The Internet Today](tech/internet_today.md)
|
||||||
- [History of Computers](tech/history/c64.md)
|
- [History of Computers](tech/history/c64.md)
|
||||||
- [Too Many Layers](tech/history/layers.md)
|
- [Too Many Layers](tech/history/layers.md)
|
||||||
- [The Internet Re-invented](tech/how_does_it_work.md)
|
- [The Internet Re-invented](tech/how_does_it_work.md)
|
||||||
- [World Records](tech/world_records.md)
|
- [World Records](tech/world_records.md)
|
||||||
- [Key Innovations](tech/key_innovations_overview.md)
|
|
||||||
- [Mycelium Network](tech/mycelium_innovation.md)
|
|
||||||
- [Zero-OS](tech/zos_innovation.md)
|
|
||||||
- [Quantum Safe Storage](tech/zstor_innovation.md)
|
|
||||||
- [Quantum Safe Filesystem](tech/qsfs_innovation.md)
|
|
||||||
- [FList: Better OS Images](tech/flist_innovation.md)
|
|
||||||
- [FungiStor](tech/fungistor_innovation.md)
|
|
||||||
- [Network Wall](tech/network_wall_innovation.md)
|
|
||||||
- [Architecture](tech/architecture.md)
|
- [Architecture](tech/architecture.md)
|
||||||
- [Energy Efficient](tech/energy_efficient.md)
|
- [Key Innovations](tech/key_innovations_overview.md)
|
||||||
- [Decentralized Cloud Core Capabilities](tech/features.md)
|
- [Compute](tech/compute_inno.md)
|
||||||
|
- [Zero-OS](tech/zos_innovation.md)
|
||||||
|
- [Zero-Images](tech/flist_innovation.md)
|
||||||
|
- [Network](tech/network_inno.md)
|
||||||
|
- [Mycelium](tech/mycelium_innovation.md)
|
||||||
|
- [Network Wall](tech/network_wall_innovation.md)
|
||||||
|
- [Storage](tech/storage_inno.md)
|
||||||
|
- [Quantum Safe Storage](tech/zstor_innovation.md)
|
||||||
|
- [Quantum Safe Filesystem](tech/qsfs_innovation.md)
|
||||||
|
- [FungiStor](tech/fungistor_innovation.md)
|
||||||
|
- [Energy Efficient](tech/energy_efficient.md)
|
||||||
|
- [ThreeFold Core Components](tech/features.md)
|
||||||
|
- [Compute](tech/compute.md)
|
||||||
|
- [Zero-OS](tech/zero_os.md)
|
||||||
|
- [Zero-Chance](tech/zero_chance.md)
|
||||||
|
- [Zero-Install](tech/zero_install.md)
|
||||||
|
- [Zero-Boot](tech/zero_boot.md)
|
||||||
- [Storage](tech/qsss_home.md)
|
- [Storage](tech/qsss_home.md)
|
||||||
- [Quantum Safe Storage Algo](tech/qss_algorithm.md)
|
- [Quantum Safe Storage Algo](tech/qss_algorithm.md)
|
||||||
- [Zero Knowledge proof](tech/qss_zero_knowledge_proof.md)
|
- [Zero Knowledge proof](tech/qss_zero_knowledge_proof.md)
|
||||||
@ -24,15 +32,16 @@
|
|||||||
- [Network](tech/networking.md)
|
- [Network](tech/networking.md)
|
||||||
- [Mycelium](tech/mycelium.md)
|
- [Mycelium](tech/mycelium.md)
|
||||||
- [Web Gateway](tech/webgw.md)
|
- [Web Gateway](tech/webgw.md)
|
||||||
- [Partners Utilization](partners_utilization/partners.md)
|
- [Partners / Utilization](partners_utilization/partners.md)
|
||||||
- [Sikana](partners_utilization/sikana.md)
|
- [Sikana](partners_utilization/sikana.md)
|
||||||
- [Vindo](partners_utilization/vindo.md)
|
- [Vindo](partners_utilization/vindo.md)
|
||||||
- [Mkondo](partners_utilization/mkondo.md)
|
- [Mkondo](partners_utilization/mkondo.md)
|
||||||
- [Vverse](partners_utilization/vverse.md)
|
- [Vverse](partners_utilization/vverse.md)
|
||||||
- [Earth Wallet](partners_utilization/earth_wallet.md)
|
|
||||||
- [Elestio](partners_utilization/elestio.md)
|
|
||||||
- [OW Freezone](partners_utilization/freezone.md)
|
|
||||||
- [Helium](partners_utilization/helium.md)
|
|
||||||
- [Holochain](partners_utilization/holochain.md)
|
- [Holochain](partners_utilization/holochain.md)
|
||||||
- [TZG](partners_utilization/tanzania.md)
|
- [TZG](partners_utilization/tanzania.md)
|
||||||
- [Tier-S DC](partners_utilization/tier_s_datacenter.md)
|
- [Tier-S DC](partners_utilization/tier_s_datacenter.md)
|
||||||
|
- [OW Freezone](partners_utilization/freezone.md)
|
||||||
|
- [Earth Wallet](partners_utilization/earth_wallet.md)
|
||||||
|
- [Helium](partners_utilization/helium.md)
|
||||||
|
|
||||||
|
<!-- - [Elestio](partners_utilization/elestio.md) -->
|
||||||
|
@ -6,5 +6,7 @@
|
|||||||
|
|
||||||
Above is not a movie or photo, we can stream 100% photorealistic real time rendered environments to our customers.
|
Above is not a movie or photo, we can stream 100% photorealistic real time rendered environments to our customers.
|
||||||
|
|
||||||
Check out the result on http://metaversestreaming.threefold.me , please note this is not a video of a real place, this is a rendered result of streaming a virtual reality session to the user.
|
<div style="padding:56.6% 0 0 0;position:relative;"><iframe src="https://player.vimeo.com/video/888463280?badge=0&autopause=0&player_id=0&app_id=58479" frameborder="0" allow="autoplay; fullscreen; picture-in-picture; clipboard-write" style="position:absolute;top:0;left:0;width:100%;height:100%;" title="pixelstreaming"></iframe></div><script src="https://player.vimeo.com/api/player.js"></script>
|
||||||
|
|
||||||
|
Check out the result on [this link](https://vimeo.com/888463280) , please note this is not a video of a real place, this is a rendered result of streaming a virtual reality session to the user.
|
||||||
|
|
||||||
|
@ -8,7 +8,6 @@ The following partners all have the potential to utilize a lot of our capacity a
|
|||||||
- [Earth Wallet](earth_wallet.md) alternative to BTC Lightening (cheap transactions, scale)
|
- [Earth Wallet](earth_wallet.md) alternative to BTC Lightening (cheap transactions, scale)
|
||||||
- [Digital Freezone](freezone.md) a digital freezone made for hundreds of millions of people.
|
- [Digital Freezone](freezone.md) a digital freezone made for hundreds of millions of people.
|
||||||
- [Tanzania Sovereign Internet](tanzania.md) a sovereign Internet for a country
|
- [Tanzania Sovereign Internet](tanzania.md) a sovereign Internet for a country
|
||||||
- [Elestio](elestio.md) +300 opensource apps on top of TFGrid (managed, supported)
|
|
||||||
- [Mkondo](mkondo.md) most realistic rendering of VR/AR env on top of TFGrid
|
- [Mkondo](mkondo.md) most realistic rendering of VR/AR env on top of TFGrid
|
||||||
- [Vindo](vindo.md) collaborative metaverse, best quality at low bandwidth
|
- [Vindo](vindo.md) collaborative metaverse, best quality at low bandwidth
|
||||||
- [Vverse](vverse.md) virtual reality museum
|
- [Vverse](vverse.md) virtual reality museum
|
||||||
|
@ -1,25 +1,5 @@
|
|||||||
|
|
||||||
# Compute is currency of future
|
!!wiki.include page:'intro0.md'
|
||||||
|
|
||||||
![alt text](currency_of_future.png)
|
|
||||||
|
|
||||||
|
|
||||||
## ThreeFold DePIN Launch: Project INCA
|
|
||||||
|
|
||||||
Welcome to the Project INCA by ThreeFold.
|
|
||||||
|
|
||||||
With the project INCA, we want to create a decentralized future for ThreeFold by means of a launch in the DePIN ecosystem on top of Solana.
|
|
||||||
|
|
||||||
*Please do note the name INCA will prob still change.*
|
|
||||||
|
|
||||||
## Contributing to DePIN community
|
|
||||||
|
|
||||||
The current marketcap of the project is under 40 million USD, while other DePIN projects have marketcaps of 1 billion USD and more.
|
|
||||||
|
|
||||||
We believe that ThreeFold is ready and has rock solid technology to offer to the DePIN space. We think that what ThreeFold has to offer is comptabile to this space and that we can work in parallel and under many if not all projects in the DePIN space.
|
|
||||||
|
|
||||||
ThreeFold now has the necessary support from a lot of parties. We are entering a new exciting phase: Project INCA.
|
|
||||||
|
|
||||||
|
|
||||||
## Learn More
|
## Learn More
|
||||||
|
|
||||||
|
22
collections/projectinca/intro0.md
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
|
||||||
|
# Compute is currency of future
|
||||||
|
|
||||||
|
![alt text](currency_of_future.png)
|
||||||
|
|
||||||
|
|
||||||
|
## ThreeFold DePIN Launch: Project INCA
|
||||||
|
|
||||||
|
Welcome to the Project INCA by ThreeFold.
|
||||||
|
|
||||||
|
With the project INCA, we want to create a decentralized future for ThreeFold by means of a launch in the DePIN ecosystem on top of Solana.
|
||||||
|
|
||||||
|
|
||||||
|
## Contributing to DePIN community
|
||||||
|
|
||||||
|
The current marketcap of the project is under 40 million USD, while other DePIN projects have marketcaps of 1 billion USD and more.
|
||||||
|
|
||||||
|
We believe that ThreeFold is ready and has rock solid technology to offer to the DePIN space. We think that what ThreeFold has to offer is comptabile to this space and that we can work in parallel and under many if not all projects in the DePIN space.
|
||||||
|
|
||||||
|
ThreeFold now has the necessary support from a lot of parties. We are entering a new exciting phase: Project INCA.
|
||||||
|
|
||||||
|
|
@ -1,10 +1,15 @@
|
|||||||
|
|
||||||
|
![](img/architecture_intro.png)
|
||||||
|
|
||||||
## Architecture
|
## Architecture
|
||||||
|
|
||||||
The ThreeFold Grid architecture provides a myriad of cloud possibilities thanks to its interrelated layers.
|
|
||||||
|
|
||||||
![](img/architecture.png)
|
![](img/architecture.png)
|
||||||
|
|
||||||
|
The system has been designed to be scalable to a planet level.
|
||||||
|
|
||||||
|
- Mycelium is the Network Layer
|
||||||
|
- 3Nodes are the nodes running Zero-OS which is our own operating System providing compute, storage and network capacity
|
||||||
|
|
||||||
### 3Nodes
|
### 3Nodes
|
||||||
|
|
||||||
The network of nodes which make up the cloud. Each node provides compute, storage and network capacity.
|
The network of nodes which make up the cloud. Each node provides compute, storage and network capacity.
|
||||||
@ -15,46 +20,26 @@ A cloud needs hardware/servers to function. Servers of all shapes and sizes can
|
|||||||
|
|
||||||
Farmers download the Zero-OS operating system and boot their servers. Once booted, these servers become 3Nodes. The 3Nodes will register themselves in a blockchain. Once registered, the capacity of the 3Nodes will become available. This enables a peer2peer environment for people or companies to reserve their Internet Capacity directly from the hardware but yet allowing full control by commercial parties if that would be required.
|
Farmers download the Zero-OS operating system and boot their servers. Once booted, these servers become 3Nodes. The 3Nodes will register themselves in a blockchain. Once registered, the capacity of the 3Nodes will become available. This enables a peer2peer environment for people or companies to reserve their Internet Capacity directly from the hardware but yet allowing full control by commercial parties if that would be required.
|
||||||
|
|
||||||
|
|
||||||
## Ultra Scalable
|
## Ultra Scalable
|
||||||
|
|
||||||
![](img/architecture_scalable.png)
|
![](img/architecture_scalable.png)
|
||||||
|
|
||||||
This architecture scales to the planet.
|
This architecture scales to the planet.
|
||||||
|
|
||||||
## Zero-OS
|
## Core Components
|
||||||
|
|
||||||
We have build our own operating system called Zero-OS, which was based starting from a Linux Kernel with as purpose to remove all the unnecessary complexities found on contemporary OS's.
|
!!wiki.include page:components_links.md
|
||||||
|
|
||||||
Zero-OS supports a small number of primitives, and performs low-level functions natively.
|
### Web3 & Decentralized AI Compatibility
|
||||||
|
|
||||||
It delivers 3 primitive functions:
|
Our Decentralized Cloud Technology the ideal platform for hosting any web3 and AI workloads.
|
||||||
|
|
||||||
- storage capacity
|
|
||||||
- compute capacity
|
|
||||||
- network capacity
|
|
||||||
|
|
||||||
There is no shell, local nor remote attached to Zero-OS. Given its shell-less nature, the people and organizations, called farmers, that run 3nodes cannot issue any commands nor access its features. In that sense, Zero-OS enables a "zero people" (autonomous) Decentralzied Cloud, meaning hackers cannot get in, while also eliminating human error from the paradigm.
|
Our Zero-OS operating system already supports integrated GPUs, ensuring optimal performance for decentralized AI applications.
|
||||||
|
|
||||||
|
> Any workload (web2/3 and AI) can run on on our Decentralized Cloud.
|
||||||
|
|
||||||
### Mycelium Routers
|
## TFChain: our Blockchain
|
||||||
|
|
||||||
Thanks to Mycelium Routers anyone can now operate as a network service provider.
|
|
||||||
|
|
||||||
Mycelium Routers seamlessly integrate with our Mycelium network technology, efficiently selecting the shortest path between all participants.
|
|
||||||
|
|
||||||
These Mycelium Routers are not only compatible with Wi-Fi but also with 4G and 5G networks, ensuring versatile connectivity options.
|
|
||||||
|
|
||||||
## 3Bots: The Autonomous Layer
|
|
||||||
|
|
||||||
![](img/autonous3bots.png)
|
|
||||||
|
|
||||||
### Smart Contract for IT
|
|
||||||
|
|
||||||
The purpose of the smart contract for IT is to create and enable autonomous IT. Autonomous self-driving IT is possible.
|
|
||||||
|
|
||||||
Once a smart contract for IT is created, it will be registered in the TFChain Blockchain.
|
|
||||||
|
|
||||||
### TFChain
|
|
||||||
|
|
||||||
This blockchain does the following:
|
This blockchain does the following:
|
||||||
|
|
||||||
@ -64,15 +49,3 @@ This blockchain does the following:
|
|||||||
- info as required for the Smart Contract for IT
|
- info as required for the Smart Contract for IT
|
||||||
|
|
||||||
This is the hart of our operational system of our decentralized cloud.
|
This is the hart of our operational system of our decentralized cloud.
|
||||||
|
|
||||||
### Web Gateways
|
|
||||||
|
|
||||||
The Web Gateway is a mechanism to connect the private (overlay) networks (Mycelium) to the open Internet. By not providing an open and direct path in to the private network, a lot of malicious phishing and hacking attempts are stopped at the Web Gateway level for container applications.
|
|
||||||
|
|
||||||
### Web3 & Decentralized AI Compatibility
|
|
||||||
|
|
||||||
Our Decentralized Cloud Technology the ideal platform for hosting any web3 and AI workloads.
|
|
||||||
|
|
||||||
Our Zero-OS operating system already supports integrated GPUs, ensuring optimal performance for decentralized AI applications.
|
|
||||||
|
|
||||||
> Any workload (web2/3 and AI) can run on on our Decentralized Cloud.
|
|
BIN
collections/tech/architecture/img/architecture_intro.png
Normal file
After Width: | Height: | Size: 316 KiB |
BIN
collections/tech/architecture/img/zos00.png
Normal file
After Width: | Height: | Size: 320 KiB |
14
collections/tech/architecture/network.md
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
### Mycelium Routers
|
||||||
|
|
||||||
|
Thanks to Mycelium Routers anyone can now operate as a network service provider.
|
||||||
|
|
||||||
|
Mycelium Routers seamlessly integrate with our Mycelium network technology, efficiently selecting the shortest path between all participants.
|
||||||
|
|
||||||
|
These Mycelium Routers are not only compatible with Wi-Fi but also with 4G and 5G networks, ensuring versatile connectivity options.
|
||||||
|
|
||||||
|
### Web Gateways
|
||||||
|
|
||||||
|
The Web Gateway is a mechanism to connect the private (overlay) networks (Mycelium) to the open Internet. By not providing an open and direct path in to the private network, a lot of malicious phishing and hacking attempts are stopped at the Web Gateway level for container applications.
|
@ -5,3 +5,5 @@ tech_overview.png
|
|||||||
tech_overview2.png
|
tech_overview2.png
|
||||||
web_remade.png
|
web_remade.png
|
||||||
cloud_features.png
|
cloud_features.png
|
||||||
|
base_layer.png
|
||||||
|
scale.png
|
||||||
|
Before Width: | Height: | Size: 549 KiB After Width: | Height: | Size: 533 KiB |
BIN
collections/tech/img/base_layer.png
Normal file
After Width: | Height: | Size: 394 KiB |
BIN
collections/tech/img/pathtoweb4.png
Normal file
After Width: | Height: | Size: 313 KiB |
BIN
collections/tech/img/scale.png
Normal file
After Width: | Height: | Size: 277 KiB |
12
collections/tech/innovations/components_links.md
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
Compute
|
||||||
|
- [Zero-OS: a minimalistic and more efficient server operating system](zos_innovation)
|
||||||
|
- [Zero-Image: a new way to deal with OS Images](flist_innovation.md)
|
||||||
|
|
||||||
|
Network
|
||||||
|
- [Mycelium: a new network layer for the Internet](mycelium_innovation.md)
|
||||||
|
- [Network Wall: a secure way to connect your apps to Internet](network_wall_innovation.md)
|
||||||
|
|
||||||
|
Storage
|
||||||
|
- [Quantum Safe Storage: storage which cannot get lost nor corrupted](zstor_innovation.md)
|
||||||
|
- [Quantum Safe Filesystem: host any storage interface e.g. IPFS](qsfs_innovation.md)
|
||||||
|
- [FungiStor: Content Delivery everwhere in the world](fungistor_innovation.md)
|
60
collections/tech/innovations/compute/compute_inno.md
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
|
||||||
|
# Compute
|
||||||
|
|
||||||
|
| | Threefold Compute Layer | Default |
|
||||||
|
|----------------|--------------------------------------------------------------------------------|------------------------------------------------------------------|
|
||||||
|
| Management | Full P2P, done by 3bot Agents, blockchain IT contract | Centralized e.g. Kubernetes, ... |
|
||||||
|
| OS Deploy | Stateless, there are no files copied on local HDD/SSD. | Deploy image or execute installer on a physical server |
|
||||||
|
| OS Upgrade | Seamless, rolling upgrades, 100% modular and pre-deterministic, decentralized | Difficult and error prone + vulnerable from security perspective |
|
||||||
|
| Tamperproof | If file gets modified Zero-OS will not boot the file. | No, man in middle is possible. |
|
||||||
|
| Scalability | To the world | Expensive and depending on lots of capital |
|
||||||
|
| Security | A lot of effort went into the capability to deploy for high security usecases. | Very hard to deploy securely, and expensive |
|
||||||
|
| Green | For certain workloads we can safe upto 10x on power usage | Super power hungry. |
|
||||||
|
| Liquid Cooling | Easy to do because of autonomous behavior no need to replace HW. | Hard to do, how to do maintenance. |
|
||||||
|
| Sovereign | Yes | No |
|
||||||
|
| Complexity | Anyone can do it, we made it to allow everyone to be a provider. | Real experts needed. |
|
||||||
|
|
||||||
|
> We do not compare our system with those that claim to be full cloud solutions but merely deploy containers using other management systems and optionally connect to a blockchain for billing purposes. Nor do we compare with marketplace systems that simply act as frontends for other systems. We believe these systems, while visually impressive, lack substantial technological foundations and cannot serve as a fundamental base layer for others.
|
||||||
|
|
||||||
|
## Zero-OS
|
||||||
|
|
||||||
|
![](img/zos00.png)
|
||||||
|
|
||||||
|
ThreeFold has developed its own operating system, Zero-OS, which is based on the Linux Kernel. The purpose of Zero-OS is to strip away the unnecessary complexities commonly found in contemporary operating systems.
|
||||||
|
|
||||||
|
**Key Features of Zero-OS:**
|
||||||
|
|
||||||
|
Zero-OS is designed with minimalism in mind, supporting only a few fundamental primitives that handle essential low-level functions:
|
||||||
|
|
||||||
|
1. **Storage Capacity**
|
||||||
|
2. **Compute Capacity**
|
||||||
|
3. **Network Capacity**
|
||||||
|
|
||||||
|
**Security and Simplicity:**
|
||||||
|
|
||||||
|
Zero-OS provides a Autonomous Decentralized Cloud.
|
||||||
|
|
||||||
|
This not only blocks hacker access but also eliminates human error, enhancing both security and reliability.
|
||||||
|
|
||||||
|
### Deployment by IT contract
|
||||||
|
|
||||||
|
Secure Reproducable Verified Authenticated
|
||||||
|
|
||||||
|
![](img/itcontract.png)
|
||||||
|
|
||||||
|
The purpose of the smart contract for IT is to create and enable autonomous IT. Autonomous self-driving IT is possible.
|
||||||
|
|
||||||
|
Once a smart contract for IT is created, it will be registered in the TFChain Blockchain.
|
||||||
|
|
||||||
|
![](img/itcontract2.png)
|
||||||
|
|
||||||
|
## Compatible with the world
|
||||||
|
|
||||||
|
![](img/compatible.png)
|
||||||
|
|
||||||
|
|
||||||
|
## 3Bots: The Autonomous Layer
|
||||||
|
|
||||||
|
![](img/autonous3bots.png)
|
||||||
|
|
||||||
|
|
5
collections/tech/innovations/compute/flist_innovation.md
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
|
||||||
|
## Zero-Images: A New Way Of Dealing With OS Images
|
||||||
|
|
||||||
|
!!wiki.include page:flist_innovation_short
|
||||||
|
|
Before Width: | Height: | Size: 229 KiB After Width: | Height: | Size: 229 KiB |
BIN
collections/tech/innovations/compute/img/compatible.png
Normal file
After Width: | Height: | Size: 294 KiB |
BIN
collections/tech/innovations/compute/img/itcontract.png
Normal file
After Width: | Height: | Size: 224 KiB |
BIN
collections/tech/innovations/compute/img/itcontract2.png
Normal file
After Width: | Height: | Size: 307 KiB |
@ -1,4 +0,0 @@
|
|||||||
|
|
||||||
## FList: A New Way Of Dealing With OS Images
|
|
||||||
|
|
||||||
!!wiki.include page:flist_innovation_short
|
|
@ -19,13 +19,10 @@
|
|||||||
|
|
||||||
!!wiki.include page:zstor_innovation_short
|
!!wiki.include page:zstor_innovation_short
|
||||||
|
|
||||||
|
|
||||||
## Quantum Safe File System
|
## Quantum Safe File System
|
||||||
|
|
||||||
|
|
||||||
!!wiki.include page:qsfs_innovation_short
|
!!wiki.include page:qsfs_innovation_short
|
||||||
|
|
||||||
|
|
||||||
## FungiStor
|
## FungiStor
|
||||||
|
|
||||||
!!wiki.include page:'fungistor_innovation_short'
|
!!wiki.include page:'fungistor_innovation_short'
|
||||||
|
@ -1,15 +1,7 @@
|
|||||||
<h1> Key Innovations </h1>
|
|
||||||
|
|
||||||
Throughout the years, we've built innovative products that are now part of a whole ecosystem.
|
|
||||||
|
|
||||||
![](dream_comes_true.png)
|
![](dream_comes_true.png)
|
||||||
|
|
||||||
<h2>Table of Contents</h2>
|
# Key Innovations
|
||||||
|
|
||||||
|
!!wiki.include page:components_links.md
|
||||||
|
|
||||||
- [Mycelium: a new network layer for the internet](mycelium_innovation.md)
|
|
||||||
- [Zero-OS: a minimalistic and more efficient server operating system](zos_innovation)
|
|
||||||
- [Quantum Safe Storage](zstor_innovation.md)
|
|
||||||
- [Quantum Safe Filesystem](qsfs_innovation.md)
|
|
||||||
- [FList: a new way to deal with OS Images](flist_innovation.md)
|
|
||||||
- [FungiStor](fungistor_innovation.md)
|
|
||||||
- [Network Wall](network_wall_innovation.md)
|
|
@ -1,4 +0,0 @@
|
|||||||
|
|
||||||
## Mycelium: A New Network Layer for the Internet
|
|
||||||
|
|
||||||
!!wiki.include page:mycelium_innovation_short.md
|
|
1
collections/tech/innovations/network/img/.done
Normal file
@ -0,0 +1 @@
|
|||||||
|
mycelium00.png
|
BIN
collections/tech/innovations/network/img/mycelium00.png
Normal file
After Width: | Height: | Size: 512 KiB |
BIN
collections/tech/innovations/network/img/network_wall.png
Normal file
After Width: | Height: | Size: 386 KiB |
@ -0,0 +1,7 @@
|
|||||||
|
|
||||||
|
|
||||||
|
![](img/mycelium00.png)
|
||||||
|
|
||||||
|
## Mycelium: A New Network Layer for the Internet
|
||||||
|
|
||||||
|
!!wiki.include page:mycelium_innovation_short.md
|
16
collections/tech/innovations/network/network_inno.md
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
# Network
|
||||||
|
|
||||||
|
| | ThreeFold Network Layer | Other Overlay Network Technologies (like VPN) |
|
||||||
|
|-----------------------------|-----------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------|
|
||||||
|
| Management | Full P2P, done by 3bot Agents, blockchain IT contract | Centralized leading to security issues |
|
||||||
|
| Locality | Find shortest path on latency and quality, this allows traffic to stay sovereign. | NO, based on centralized control mechanisms or inefficient algorithms that route traffic indiscriminately across the globe. |
|
||||||
|
| Encryption | End2End ecryption, unique for every relation, linked to private key | Normally based on key exchange, or pre-shared keys. |
|
||||||
|
| Post Quantum | Possible (ask us) | No |
|
||||||
|
| Scalability | Our aim is to be planetary scalable, but we need more exposure. | Bad |
|
||||||
|
| Compatibility | We aim to support mobile, desktop, IOT, ... | Depends, often not |
|
||||||
|
| Backdoors | NO, all is based on opensource | Often, yes, unfortunately. |
|
||||||
|
| Performance | Quite good, 1 gbit / sec can be achieved on std node (which is high for overlay) | Often slow. |
|
||||||
|
| Security Model | Whitelist model | Blacklist model, list who is bad e.g. firewalls |
|
||||||
|
| Fully integrated in compute | Yes | Lots of different solutions |
|
||||||
|
|
||||||
|
|
@ -1,8 +1,10 @@
|
|||||||
|
|
||||||
|
|
||||||
|
![](img/network_wall.png)
|
||||||
|
|
||||||
## Network Wall
|
## Network Wall
|
||||||
|
|
||||||
The Network Wall offers 100% separation between where compute workloads are and where services are exposed, proving an extremely high level of security.
|
The Network Wall offers 100% separation between where compute workloads are and where services are exposed, proving an extremely high level of security.
|
||||||
|
|
||||||
![](network_wall.png)
|
|
||||||
|
|
||||||
!!wiki.include page:network_wall_innovation_short
|
!!wiki.include page:network_wall_innovation_short
|
Before Width: | Height: | Size: 422 KiB |
1
collections/tech/innovations/storage/img/.done
Normal file
@ -0,0 +1 @@
|
|||||||
|
storage_inno.png
|
BIN
collections/tech/innovations/storage/img/storage_inno.png
Normal file
After Width: | Height: | Size: 246 KiB |
@ -15,8 +15,6 @@ Metadata redundancy is included. While not consistently synchronized in real-tim
|
|||||||
|
|
||||||
This filesystem can be mounted under various storage-aware applications, such as backup servers, file servers, or S3 servers, enhancing versatility.
|
This filesystem can be mounted under various storage-aware applications, such as backup servers, file servers, or S3 servers, enhancing versatility.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Benefits
|
### Benefits
|
||||||
|
|
||||||
- Inherits the advantages of Zero-Stor, including enhanced data security, efficiency, and scalability.
|
- Inherits the advantages of Zero-Stor, including enhanced data security, efficiency, and scalability.
|
17
collections/tech/innovations/storage/storage_inno.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
![](img/storage_inno.png)
|
||||||
|
|
||||||
|
# Storage
|
||||||
|
|
||||||
|
|
||||||
|
| | ThreeFold Network Layer | Overlay Storage Systems / Networks |
|
||||||
|
|-----------------------------|------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------|
|
||||||
|
| Management | Full P2P, done by 3bot Agents, blockchain IT contract | Centralized leading to security issues |
|
||||||
|
| Locality | Data can be local and sovereign, full control by the the user (data creator) | Based on centralized control mechanisms or inefficient algorithms that route traffic indiscriminately across the globe. |
|
||||||
|
| Quantum Safe | Yes, novel encoding system (not encryption based) makes impossible to hack data. | No |
|
||||||
|
| Post Quantum | Possible (ask us) | No |
|
||||||
|
| Scalability | Yes, this system exists +10 years, is being used by large orgs for zetabytes. | Some systems, most not, but centralized. |
|
||||||
|
| Compatibility | Yes thanks to filesystem approach | Depends, often not |
|
||||||
|
| Backdoors | NO, all is based on opensource | ? |
|
||||||
|
| Performance | Is not a super fast system but good for most cases, +- 100 MB / sec per content creator. | Variable, hard to say, some are |
|
||||||
|
| Efficiency for redundancy | Ultra efficient, only 20% overhead to allow 4 locations to go down | NO, sometimes +5 copies = 500% |
|
||||||
|
| Fully integrated in compute | Yes | Lots of different solutions |
|
BIN
collections/tech/internet/img/3layers.png
Normal file
After Width: | Height: | Size: 424 KiB |
Before Width: | Height: | Size: 360 KiB |
@ -1,8 +1,8 @@
|
|||||||
# The Internet Is Broken
|
# Rethinking the Internet
|
||||||
|
|
||||||
**The Three Layers Of The Internet**
|
**The Three Layers Of The Internet**
|
||||||
|
|
||||||
![](internet_3layers.png)
|
![](img/3layers.png)
|
||||||
|
|
||||||
The Internet is made up of 3 layers:
|
The Internet is made up of 3 layers:
|
||||||
|
|
||||||
@ -12,6 +12,10 @@ The Internet is made up of 3 layers:
|
|||||||
|
|
||||||
3. Applications: currently applications are hosted in huge data centers using the compute and storage as provided. This system is too centralized and therefore very vulnerable.
|
3. Applications: currently applications are hosted in huge data centers using the compute and storage as provided. This system is too centralized and therefore very vulnerable.
|
||||||
|
|
||||||
|
ThreeFold is providing solutions for the first 2 layers and allows everyone else to build on top.
|
||||||
|
|
||||||
|
**Current Challenges**
|
||||||
|
|
||||||
Digital information mainly travels over large fiber backbone links as pictured here.
|
Digital information mainly travels over large fiber backbone links as pictured here.
|
||||||
|
|
||||||
![](global_net.png)
|
![](global_net.png)
|
||||||
@ -22,9 +26,28 @@ This leads to very inneficient behavior, slower performance, less reliability an
|
|||||||
|
|
||||||
![](network_path.png)
|
![](network_path.png)
|
||||||
|
|
||||||
Another important aspect is the lack of autonomy and sovereignty within this Internet. We have become the products. All of our data is hosted in large data centers owned by a few large corporations.
|
**Issues with Autonomy and Sovereignty**
|
||||||
|
|
||||||
|
Our current internet model compromises autonomy and sovereignty. Most data is stored in large data centers controlled by a few major corporations, effectively turning users into products.
|
||||||
|
|
||||||
![alt text](we_are_products.png)
|
![alt text](we_are_products.png)
|
||||||
|
|
||||||
|
|
||||||
We also exist many times on the Internet across many applications and each time a full infrastructure has been built to deliver the applications from. This system is unsustainable and inefficient.
|
Moreover, the internet is replicated many times across various applications, each requiring its own full infrastructure. This approach is unsustainable and inefficient.
|
||||||
|
|
||||||
|
## ThreeFold wants to create a new base layer
|
||||||
|
|
||||||
|
A Base layer who doesn't have these issues.
|
||||||
|
|
||||||
|
ThreeFold resolves
|
||||||
|
|
||||||
|
- reliability for data, data can never be corrupted nor lost
|
||||||
|
- reliability for network, connectivity should always be possible
|
||||||
|
- sovereignity
|
||||||
|
- scalability
|
||||||
|
- security
|
||||||
|
- locality
|
||||||
|
- cost
|
||||||
|
- management (easier to scale)
|
||||||
|
|
||||||
|
|
||||||
|
35
collections/tech/internet/t.md
Normal file
@ -0,0 +1,35 @@
|
|||||||
|
# Rethinking the Internet
|
||||||
|
|
||||||
|
**Understanding the Three Layers of the Internet**
|
||||||
|
|
||||||
|
![](internet_3layers.png)
|
||||||
|
|
||||||
|
The Internet is made of 3 layers:
|
||||||
|
|
||||||
|
1. **Compute & Storage:** This layer houses applications and is predominantly centralized, operating from vast data centers.
|
||||||
|
|
||||||
|
2. **Network:** The network layer facilitates the movement of information, whether it's wireless, via cables like fiber, or through satellite links. Today, information often travels long distances, with a few companies controlling over 80% of the internet’s network capacity.
|
||||||
|
|
||||||
|
3. **Applications:** These are hosted in large data centers, relying on the centralized compute and storage layers. This centralization makes the system vulnerable.
|
||||||
|
|
||||||
|
**Current Challenges**
|
||||||
|
|
||||||
|
Digital information primarily flows through extensive fiber backbone networks, as shown here:
|
||||||
|
|
||||||
|
![](global_net.png)
|
||||||
|
|
||||||
|
The internet’s design causes inefficiencies, such as when two people in Zanzibar use a service like Zoom. Their data travels all the way to European data centers where Zoom's servers are hosted and back, leading to slow performance, decreased reliability, and increased costs.
|
||||||
|
|
||||||
|
![](network_path.png)
|
||||||
|
|
||||||
|
**Issues with Autonomy and Sovereignty**
|
||||||
|
|
||||||
|
Our current internet model compromises autonomy and sovereignty. Most data is stored in large data centers controlled by a few major corporations, effectively turning users into products.
|
||||||
|
|
||||||
|
![](we_are_products.png)
|
||||||
|
|
||||||
|
Moreover, the internet is replicated many times across various applications, each requiring its own full infrastructure. This approach is unsustainable and inefficient.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
This retains the original structure and links, ensuring that the information is clear and the visual aids are effectively utilized.
|
@ -1,24 +1,13 @@
|
|||||||
|
![](img/base_layer.png)
|
||||||
|
|
||||||
# The Internet’s Natural Progression
|
# The Internet’s Natural Progression
|
||||||
|
|
||||||
The Internet was always meant to be a peer-to-peer infrastructure. As large companies became profit and data centric, centralization quickly became the norm.
|
The Internet was always meant to be a peer-to-peer infrastructure.
|
||||||
|
|
||||||
|
As large companies became profit and data centric, centralization quickly became the norm.
|
||||||
|
|
||||||
***We have a vision of the Internet which is much more close to how the Internet was intended to be.***
|
***We have a vision of the Internet which is much more close to how the Internet was intended to be.***
|
||||||
|
|
||||||
|
|
||||||
![alt text](natural_progression.png)
|
|
||||||
|
|
||||||
We believe in a world where every person is the center of their digital life. In this new Internet each person has their own digital avatar which we call a ***Hero***.
|
|
||||||
|
|
||||||
The technical component which makes Hero possible is a compoment called 3Bot. This 3Bot server. only owned and managed by you, lives on top of the cecentralized cloud.
|
|
||||||
|
|
||||||
All the 3Bots communicate to each other over the shortest possible path. This path is end-to-end encrypted.
|
|
||||||
|
|
||||||
![alt text](arch_minimal.png)
|
|
||||||
|
|
||||||
The underlying network of capacity is the decentralized cloud which is like the basic IT energy which makes all of this possible.
|
|
||||||
|
|
||||||
The cecentralized cloud is the result of more than 10 years of development and it is now active on more than 2000 nodes.
|
|
||||||
|
|
||||||
## Requirements For A New Internet
|
## Requirements For A New Internet
|
||||||
|
|
||||||
![alt text](requirements.png)
|
![alt text](requirements.png)
|
||||||
@ -37,4 +26,23 @@ The cecentralized cloud is the result of more than 10 years of development and i
|
|||||||
- Working no matter what happens with existing network, route around issues
|
- Working no matter what happens with existing network, route around issues
|
||||||
- Local sensitive (chose shortest path)
|
- Local sensitive (chose shortest path)
|
||||||
- End2End Encrypted
|
- End2End Encrypted
|
||||||
- Capable to really know where information goes to or comes from (authenticity)
|
- Capable to really know where information goes to or comes from (authenticity)
|
||||||
|
|
||||||
|
## Natural Progression
|
||||||
|
|
||||||
|
![alt text](natural_progression.png)
|
||||||
|
|
||||||
|
We envision a world where every person is at the center of their digital life. In this new Internet, each person has their own digital avatar, which we call a ***Hero***.
|
||||||
|
|
||||||
|
The technical backbone enabling the Hero is a component known as the 3Bot. This server, owned and managed by you, operates on our decentralized cloud infrastructure.
|
||||||
|
|
||||||
|
Communication between 3Bots is optimized to use the shortest possible paths, ensuring that all interactions are end-to-end encrypted for maximum security and privacy.
|
||||||
|
|
||||||
|
## 3Bot Architecture in relation to TFGrid
|
||||||
|
|
||||||
|
![alt text](arch_minimal.png)
|
||||||
|
|
||||||
|
The underlying network of capacity is the decentralized cloud which is like the basic IT energy which makes all of this possible.
|
||||||
|
|
||||||
|
The cecentralized cloud is the result of more than 20 years of development and it is now active on more than 2000 nodes.
|
||||||
|
|
||||||
|
45
collections/tech/overview.md
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
![](dream_comes_true.png)
|
||||||
|
|
||||||
|
For over 20 years, across more than seven startups, ThreeFold has been developing a fourth-generation base layer. This robust platform serves as a truly decentralized infrastructure, designed to be hosted by everyone, for everyone.
|
||||||
|
|
||||||
|
## ThreeFold: The Base Layer for DePin and Web 3
|
||||||
|
|
||||||
|
![](img/base_layer.png)
|
||||||
|
|
||||||
|
ThreeFold has developed a scalable, reliable, and efficient decentralized infrastructure base layer.
|
||||||
|
This serves as the foundational base for any Decentralized Physical Infrastructure Network (DePin) or Web 3 application.
|
||||||
|
|
||||||
|
## Anyone can be a cloud service provider
|
||||||
|
|
||||||
|
**Getting started is easy:** Just get a ThreeFold node and connect it to the Internet.
|
||||||
|
|
||||||
|
![ThreeFold Node](3node_simple.png)
|
||||||
|
|
||||||
|
Around the world, thousands of entities, from individuals to companies, have become ThreeFold farmers. They connect their computers, known as nodes, to the Internet and install our software. This allows them to provide GPU, compute, storage, and network capacity to the ThreeFold Grid.
|
||||||
|
|
||||||
|
Farmers have two options: they can either buy a ready-made node from our partners or build their own using our detailed DIY (Do It Yourself) guides.
|
||||||
|
|
||||||
|
|
||||||
|
## Usable by Everyone
|
||||||
|
|
||||||
|
![](img/architecture_usage.png)
|
||||||
|
|
||||||
|
Our platform is designed for everyone, whether you are a developer, system administrator, or IT expert.
|
||||||
|
|
||||||
|
## Open Source Technology
|
||||||
|
|
||||||
|
All of our technology is open source and build by our tech company called TF9 and used to build the ThreeFold Gridt. For more information, visit the [ThreeFold Website](https://www.threefold.io).
|
||||||
|
|
||||||
|
## Bridging the Web2, Web3, and Blockchain Worlds
|
||||||
|
|
||||||
|
ThreeFold acts as the essential layer connecting traditional web technologies with the new, decentralized Web3 and blockchain worlds.
|
||||||
|
|
||||||
|
![](img/pathtoweb4.png)
|
||||||
|
|
||||||
|
## Scalability and Growth
|
||||||
|
|
||||||
|
Our system is designed to scale effortlessly, meeting the needs of a rapidly evolving digital landscape.
|
||||||
|
|
||||||
|
![](img/scale.png)
|
||||||
|
|
||||||
|
|
@ -1,28 +0,0 @@
|
|||||||
|
|
||||||
# ThreeFold Grid Technology
|
|
||||||
|
|
||||||
ThreeFold has developed a highly efficient infrastructure layer for a new Internet.
|
|
||||||
|
|
||||||
Providing Internet & cloud capacity is as easy as getting a node and connecting it to the Internet.
|
|
||||||
|
|
||||||
![](3node_simple.png)
|
|
||||||
|
|
||||||
A lot of capacity has been deployed in the world, hundreds of ThreeFold farmers acquired a computer and connected it to the Internet, as such they use our operating system to provide Internet capacity to the world. Farmers can buy pre-built node or build their own via our DIY guides.
|
|
||||||
|
|
||||||
There are multiple ways in which people can interact with our platform, as a developer, a sysadmin, IT expert, etc.
|
|
||||||
|
|
||||||
![](img/architecture_usage.png)
|
|
||||||
|
|
||||||
All technology is developed by ThreeFold and is opensource, this technology is being used for the ThreeFold grid (see the [ThreeFold Website](https://www.threefold.io)) which is the deployment of a new Internet which is green, safe and owned by all of us.
|
|
||||||
|
|
||||||
This document explains how ThreeFold is the missing layer for the full web2, web3 and blockchain world.
|
|
||||||
|
|
||||||
This leads to a system which is highly scalable.
|
|
||||||
|
|
||||||
![](img/web_remade.png)
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
## Deterministic Deployment
|
## Zero-Chance = Deterministic Deployment
|
||||||
|
|
||||||
![](img/smartcontract_deploy.png)
|
![](img/smartcontract_deploy.png)
|
||||||
|
|
||||||
@ -16,10 +16,6 @@ Metadata is exposed. The system sees the full tree of the image, but data itself
|
|||||||
It is a static agreement between farmer and user about deployment of an IT workload
|
It is a static agreement between farmer and user about deployment of an IT workload
|
||||||
- no dynamic behavior for deployment at runtime
|
- no dynamic behavior for deployment at runtime
|
||||||
- no process can start unless the files are 100% described on flist level
|
- no process can start unless the files are 100% described on flist level
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### There are multiple ways to create an flist:
|
### There are multiple ways to create an flist:
|
||||||
|
|
@ -1,4 +1,4 @@
|
|||||||
# ZOS Protect
|
# Zero-Tech
|
||||||
|
|
||||||
- The operating system of the 3node (Zero-OS) is made to exist in environments without the presence of technical knowhow. 3nodes are made to exist everywhere where network meet a power socket. The OS does not have a login shell and does not allow people to log in with physical access to a keyboard and screen nor does it allows logins over the network. There is no way the 3node accepts user initiated login attempts.
|
- The operating system of the 3node (Zero-OS) is made to exist in environments without the presence of technical knowhow. 3nodes are made to exist everywhere where network meet a power socket. The OS does not have a login shell and does not allow people to log in with physical access to a keyboard and screen nor does it allows logins over the network. There is no way the 3node accepts user initiated login attempts.
|
||||||
- For certified capacity a group of known strategic vendors are able to lock the [BIOS](https://en.wikipedia.org/wiki/BIOS) of their server range and make sure no-one but them can unlock and change features present in the BIOS. Some vendors have an even higher degree of security and can store private keys in chips in side the computer to provider unique identification based on private keys or have mechanisms to check wether the server has been opened / tampered with in the transportation from the factory / vendor to the Farmer. All of this leads to maximum protection on the hardware level.
|
- For certified capacity a group of known strategic vendors are able to lock the [BIOS](https://en.wikipedia.org/wiki/BIOS) of their server range and make sure no-one but them can unlock and change features present in the BIOS. Some vendors have an even higher degree of security and can store private keys in chips in side the computer to provider unique identification based on private keys or have mechanisms to check wether the server has been opened / tampered with in the transportation from the factory / vendor to the Farmer. All of this leads to maximum protection on the hardware level.
|