-
Cryptocurrencies
-
Exchanges
-
Media
All languages
Cryptocurrencies
Exchanges
Media
Sentinel is a multi-protocol network for accessing distributed resource marketplaces. Services on the Sentinel network run on service nodes, which utilize resource nodes to run traditional and decentralized applications using the network's inherent token $DVPN. Sentinel is built on a decentralized global infrastructure with excellent properties of pseudonymity, immutability and global consensus, making it an ideal solution for transaction and data layers.
The first implementation of Sentinel on the service chain is a very secure decentralized VPN service. This VPN is based on peer-to-peer technology. This means that the network runs due to the support of people rather than a central server. Central servers can be monitored by governments or shut down by hackers. Sentinel's dVPN service allows a person to use a VPN service or help a VPN by sharing free, unused Internet with others in the network. This can be done in a very secure manner using very novel techniques.
People who share the Internet with others are called Nodes. The node can choose the price of the internet he shares. This is done through our cryptocurrency, the Sentinel Token (represented by $DVPN). For example; a node that shares its Internet with others can charge users in $DVPNs per gigabyte of Internet shared, or simply $DVPNs/GB.
Application scenario
Distributed, no nodes store complete data
Minimal data retention on the network due to incomplete data. Content owned by each node is only hashed and viewed by the owner. User identification data is stored on a separate chain. BFT-based consensus using the TenderMint consensus engine. Any attack on the network will trigger automatic scaling and network relocation, which isolates the affected nodes.
Developer friendly SDK
Unlike very expensive resource intensive central servers, service nodes provide fast testing and implementation as physical resources, which are very expensive. Easy to use end use. Services/applications can be traded on the marketplace.
Connect to all services using a single desktop/mobile client.
Currently using a single point of access to simplify the service. Users can be incentivized if they become service provider nodes and maintain a good reputation.
dVPN is the first implemented feature of Native Services, developers can implement Sentinel SDK in their own applications. It is also possible to sell and trade applications and resources on the Sentinel Services Marketplace.
Technical Overview
Sentinel employs a so-called multi-chain architecture and is resource-rich to ensure data exchange between people and applications (traditional, enterprise applications, mobile applications, and dApps) (meaning that the protocol's inherent processing centralization and decentralized application capabilities). The network addresses infrastructure and scaling issues to achieve production-level transaction speeds by implementing:
Multi-chain Architecture
Identity Chain - Creates an Anonymous User ID (AUID) and stores it in a separate chain that interacts with other chains to provide access to services on the service chain as well as transactions On-chain payment processing.
Service Chaining - Secure data tunneling using underlying and upper layer relay networks. Governance will be implemented on top of the service chain, and a peg token called the Sentinel Service Token ($DVPN-SST) will be the utility token used for transactions in the service chain. The payment and related processing of sending transactions to the Sentinel transaction pool are handled by the Sentinel transaction chain.
Identity Chain and Anonymous User ID (AUID)
The AUID will be the single source of access to all services on the Sentinel Network. The network will be managed by reputation. Higher reputation and easier access to services and masternodes. The network incentivizes good behavior with money, where a higher reputation will mean a higher earning potential. The AUID does not store any information unless requested and provided by the user.
The problem of a single point of failure is solved by distributing the AUID ledger across the entire network of Sentinel nodes. Bad actors engaging in spam or malicious activity reduce the risk to reputation. The network's distributed consensus mechanism can quickly and efficiently identify infected IDs. An automated mitigation solution will kick in so that the network is not affected. Efficient application-specific identity management.
A decentralized virtual private network powered by blockchain technology. dVPN (Decentralized Virtual Private Network) is the first use case built on the blockchain, with a highly distributed network topology with nodes distributed all over the world. Each node can be a desktop/laptop computer, a mobile phone, or even a server on the cloud. A ledger of packets/data transactions is stored on the blockchain via a "Proof of Flow" consensus system that primarily incentivizes users for the bandwidth provided and utilizes any unused bandwidth they may claim on the Sentinel network to Monetization.
In addition to dVPN, Sentinel also plans to process images and firmware, installed in a box that takes ethernet as input and connects to a home/office router. This way, all traffic going through the router will go through the VPN. This box also consumes a fraction of the PC's power consumption and thus also contributes to the efficient monetization of network bandwidth.
Related links:
https://sentinelgroup.io/
https://bitcointalk.org/index.php?topic=2233859.0
https://github.com/sentinel-official/ sentinel/blob/master/README.md