DPN Explained

 In Decentralized Private Network

What is the Decentralized Private Network, DPN™

Simply put, it’s a number of computers connected to form an overlay network. However, the basic idea of the DPN™ is that it is not a real network such as the Internet; it is a decentralized one.  Let’s explore what that means and how we, the ordinary Internet users, may benefit from decentralization. In order to begin, let’s imagine the entire Internet–millions of computers, servers, and other various devices combined into one giant network without a single center. This network exists physically, in the form of wires connecting all the computers in this network. A decentralized private network (DPN™) does not have these physical components. All the computers and devices are connected to each other in a DPN™; however, they do not have wires to arrange this connection. They use the same Internet to which they continue to be connected. They permeate the conventional internet with encrypted tunnels and are interconnected by the tunnels inside the regular internet. This is the distribution of DPN™.

Another important characteristic of the DPN™ is that the aforementioned tunnels are highly encrypted, Quantum Safe encrypted for future proofing. Therefore, the DPN™ communications are invisible to all other participants of the internet,
and it is not possible to intercept and read the data being transmitted within the DPN™.

Security is the basic function of the DPN™

For example, you will benefit in the following cases:
1. You do not want anyone to have access to the data you submit to the internet.
2. You do not want your ISP (Internet Service Provider) to know and log your internet activity.
3. You do not want various government agencies to track you and your actions on the internet (yes, they do it!).
4. You do not want various sites that you visit, and programs installed on your computer, to collect and send marketing information about you and about what you are doing on the internet (yes, they do it too!).

All of which means you’ll need to take your online privacy into your own hands and DPN™ do exactly that.

Protection
When you are connected to the Internet using DPN™, your computer or device becomes invisible to the rest of the internet. Bots, Viruses, Trojans and hackers which inhabit the internet simply cannot attack you, because you do not “exist” for them. If you are not using DPN™, you are especially vulnerable when you connect to the Internet via an open Wi-Fi network in the airport, coffee shop or any other public place. Because an open Wi-Fi network is unencrypted and unsecured, attackers may gain access to everything stored on your computer (e.g., important passwords) without any serious effort. They can even intercept your session with your online banking site and transfer your money to their accounts while you have your coffee. However, none of this is possible if you are connected to a DPN™ – for your attackers, both you and your connection do not exist.

Anonymity
Whenever you are connected to the Internet, you are assigned an IP address–a numerical combination that is essentially similar to a regular street address. With an IP address, you can be tracked down as easily as with a regular street address. You will be amazed at how much one can learn about you; just visit this page: http://addgadgets.com/IPaddress/.

Overcoming Censorship
The governments of some countries, the list of which is long enough, practice censorship of the Internet. They restrict access to many websites that have content they consider to be harmful. Depending on the country, this list may include Wikipedia, Facebook, YouTube, and even Google. Using DPN™ helps people to overcome such restrictions.

The Uniqueness of DPN™:

• There are no centralized servers
• The Nodes are and define the network
• All connections are End2End encrypted tunnels
• All payload data is Quantum Safe
• Exit points can be random bounced or chosen by geographic area
• No central point of failing
• There are no logs kept anywhere in the system
• Nothing is ever saved
• Uses port 80 (www) to negotiate a tunnel through any university/corporate Lan
• Uses port 80 (www) to negotiate a tunnel through country “firewalls” (Iran, China)
• No ugly fine print in the user agreement, no logs no data saved period!
• works on restricted network

Recommended Posts
NewYork City Buildings