, 24 tweets, 11 min read Read on Twitter
Communication without privacy is slavery to the controllers of the communication channel. Manipulations can occur as your data isn't in your control.

Welcome to a new era of secured communications as we introduce @Mainframe_HQ platform.

#crypto, #tech

👇👇
@Mainframe_HQ 1/ Mainframe is an incentivized and fully decentralized communications platform that enables reliable packet routing, packet holding, packet delivery, file storage and data services.

It's security model provides encryption, resistance to censorship and surveillance.

#crypto
@Mainframe_HQ 2/ A simple illustration of how information is transferred over the internet. Mr. A. switches on his data, his ID assigns him an IP address using DHCP (Dynamic Host Configuration Protocol).

The IP address contains personal info. about Mr. A such as his geographical location.
@Mainframe_HQ 3/ Mr. A wishes to send information to Mr. B, he gets the IP address of Mr. B and puts it on the network together with the info. he wishes to send

The info. would be split into packets and goes through a router or series of routers (a device that transports info. btwn networks)
@Mainframe_HQ 4/ It is important to note that all the traffics are communicated across the IP.
From this analogy, it's obvious that multiple third parties mediate users' information and aren't often aligned with the user's best interest

This threatens the privacy of anyone with valuable info
@Mainframe_HQ 5/ @Mainframe_HQ uses an unprecedented communications platform that solves this problem by providing unparalleled security which includes:

-Data privacy : Full end-to-end and group encryption
-Surveillance resistance
-Censorship resistance

#crypto, #security, #technology
@Mainframe_HQ 6/ Many platforms have been designed to decentralize information. They were built using underlying protocols, services and other tools that are susceptible to centralized control, surveillance etc.

The protocols were also built without user privacy and data security in mind
@Mainframe_HQ 7/ They were invented in an environment where there was a high level of trust between network nodes, unlike today's internet.

Also, lack of balanced incentives in the protocols increases the likelihood that businesses will use them in exploitative ways.

#crypto
@Mainframe_HQ 8/ Let's delve into how @Mainframe_HQ tech works

To prevent an attacker from detecting a person's geographical location using his IP, Mainframe uses a peer-to-peer network that creates a layer of abstraction above which the geographical location of nodes can't easily be known.
@Mainframe_HQ 9/ The core of Mainframe is a Kademlia-based peer-to-peer network used to propagate and execute blockchain transactions. For those that don't know, Bittorent uses Kademlia algorithm for its p2p file sharing service.

Each p2p service is managed entirely by peers in the network
@Mainframe_HQ 10/ Every Mainframe node has an asymmetric key pair associated with it. The private key is used to decrypt packets, while the public key is used to encrypt packets.

An intriguing aspect of Mainframe is a concept called Multicasting.

#security
@Mainframe_HQ 11/ Multicasting enables a sender that wants to distribute multiple packets to different nodes to send just a single packet instead of duplicates.

It allows identical information destined for a group of nodes to be encrypted once and sent across the network
@Mainframe_HQ 12/ Another feature of this platform is Dark routing. If Node AB wants to send a message to Node BD, the node AB would send that msg to nodes that have a partial matching address to Node BD. This means that node BC, node BF would get the msg, but only node BD can decrypt it.
@Mainframe_HQ 13/ This is amazing because it makes surveillance difficult as one can't ascertain the original sender of the message and the intended recipient of the message.

This feature can also be customized by a node to increase or decrease the anonymity of the node.
@Mainframe_HQ 14/ All nodes that participate in the network are incentivized to make the platform efficient and effective.

Mainframe incentivizes packet routing, packet holding, packet delivery, file storage and data services.

#MFT, #BTC
@Mainframe_HQ 15/ Mainframe nodes publish their services and prices to the network using a service discovery protocol. If peers agree upon service prices, they enter into a peering relationship.

The nodes carry out transactions using Mainframe tokens (MFT)
@Mainframe_HQ 16/ Incentivized packet routing - here, nodes participate in routing packets to various nodes. A node that wants its data to be routed would issue a check to the routing node. Checks are exchanged off-chain to avoid costly transactions.
@Mainframe_HQ 17/ If a node attempts to cash a check for tokens and the balance is insufficient, the node incurs a loss, but bounced checks would also damage the reputation of the sender, and would eventually be prevented from participating in the network.
@Mainframe_HQ 18/ Each node has a credit score. It is the credit score that is used to validate the accountability of the node. A node may choose to disconnect from a peer with a low credit score.

The credit score is visible to everyone on the blockchain.
@Mainframe_HQ 19/ Incentivized packet delivery - once a node delivers a packet, he would issue a receipt verifying that the packet has been delivered. The only scenario where a receipt isn't provided is if the recipient node isn't available and they are the closest node to the receipient
@Mainframe_HQ 20/ Incentivized packet holding- Nodes that can't be online can assign delegate nodes to hold packets for them while they are offline. The list of delegates is visible all nodes. If a node decides not to deliver a packet, it would be penalized using a swindle contract
@Mainframe_HQ 21/ Incentivized file storage - the process is thesame with the incentivized packet holding

Incentivized data services - it's inefficient for all nodes to keep notice of every change in a file. So some nodes can offer to act as database management services.
@Mainframe_HQ 22/ The nodes providing the service of data storage would be able to update, read, write, delete records from the distributed databases. They can also give privilege access to other nodes to be able to read, or insert into the database
@Mainframe_HQ 23/ From the above illustrations, it is an undeniable fact that this communication protocol is totally decentralized, distributed, censorship resistant, surveillance resistance and incentivized for the community.

It's worth giving a shot. 💝💝💝💝💝
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to WhitepaperSummary
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member and get exclusive features!

Premium member ($3.00/month or $30.00/year)

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!