Tachyon Protocol is a decentralized internet protocol that aims to create a Libre, Secure and Private Internet for you. Based on Tachyon Protocol, the Next-Gen VPN, IoT, DeFi, Storage, CDN, DNS and other Apps will benefit 900 million users at least.
After 36 years of use, TCP/IP-based internet communication is gradually lagging behind contemporary users’ increasing demand for stability, security, speed and trust. Tachyon protocol reconstructs TCP/IP network protocol stack by using proven and accepted P2P technologies such as DHT and PPPoIP, self-developed technologies such as UDP and real-time optimal routing, combining end-to-end encryption, traffic hiding, multi-path concurrent routing, and multi-relay forwarding scheme to achieve high security, intractability, availability, and maximum network speed. The existing lack of trust and security in internet privacy, along with the aging infrastructure, inhibits the internet in providing the speed and reliability required by current network-based, Web 3.0 services such DeFi and other complex applications. To bring a new solution in resolving these issues, Tachyon Protocol utilizes the existing and widely accepted platform, while eliminating the very idea of centralized servers, where proxies, VPNs, cloud storage, CDN’s, DeFi or any other services that require a sturdy, secure platform can build their businesses on. Tachyon Network is built on the V SYSTEMS blockchain with the use of existing and tested technologies to ensure its lasting effectiveness, such as modular design, user-orientation, nodes and versatile application possibilities. Key features of the protocol include: - Tachyon Booster UDP - adopting techniques from DHT, blockchain, UDP and the real-time Optimal Routing, it is capable of 200%~1000% transmission acceleration and over 90% connection success rate in complex network environmentbased on experimental data. - Tachyon Security Protocol - an asymmetric end-to-end encrypted content simulation security protocol that provides real-time protection against man-in-the-middle attacks (MITM), as well as other security issues, when both parties conduct end-to-end communication. - Tachyon Anti-Content Analysis - enhancing network anti-monitoring capabilities through concurrent multi-routing scheme and multi-relay forwarding scheme. - Tachyon SDK - combined with blockchain, it can be easily integrated and instantaneously deployed with all popular programming languages. - IPX Token - which shall be introduced in the Tachyon Protocol to incentivize various participants to contribute to the positive development of the Tachyon ecosystem. The IPX token resides on the V SYSTEMS blockchain.