Test Net

The Invisible Internet

Welcome to the Multiverse. The Invisible Internet (NVIS) powered by Blockchain. Like a whole new Internet.
Solution: Invisible Internet (NVIS)
The Invisible internet (NVIS) is a layer 2 encrypted peer-to-peer network based on Ethereum, and offers the same advantages of PoW, PoS and  Solidity Smart Contracts but adds security and transparency to mitigate disruptions and hacks.
Problem: Blockchain Vulnerabilities
Blockchains are the foundation of cryptocurrencies and the transformation of a vast number of business transaction systems. Security and privacy are not, however, integral to their architecture. The public blockchain implementations for popular cryptocurrencies (e.g., Bitcoin and Ethereum) lead to the misconception that they are secure by virtue of scale. Transparency of transactions is a feature.  Transparency of networks, however, is a critical weakness. This was demonstrated recently when a protocol exploit brought down the Bitcoin Unlimied network and resulted in billions of losses. NVIS could prevent this.
  1. Vulnerabilities
    Port vulnerability remains a major weakness in conventional TCP/IP networks. Any given host can have up to 65,535 TCP and UDP ports. There are 1024 commonly used for well-known services, such as FTP, SSH, HTTP, SMTP, DNS, etc. The vulnerabilities include DoS attacks, penetration and protocol exploits. Open ports are actively used by port listeners. Ports can be closed, but not secured against malicious software as backdoors.
  2. Transparency
    Our solution is to have a blockchain with integrated peer-to-peer layer 2 encryption between nodes. The implementation will be a layer 2 over layer 3 VPN so from the inner perspective of the node, all ports are available. From the outer perspective of the node (the Internet side), all TCP ports are closed and filtered by iptables, except for the port used as a funnel for communication with a named community of peers.
  3. Security
    The TLC secure community are encrypted at layer 2, and thus visible only to stakeholders and participants, while retaining the key benefits of the blockchain – anonymity redundancy, consensus and immutability between peers.
  4. Distributed
    A normal private network is limited to a single enterprise and not routable. TLC nodes are peer-to-peer so each node can communicate with the others regardless of geographical distance. Applications such as blockchain clients, pools and miners operate normally, but are impenetrable from the outside. The result is a public private network that can be distributed worldwide.
  5. Proof of Work
    ETH will end Proof of Work mining in the near future. 3EMU will remain friendly to mining. Mining will continue using the popular ETHASH algorithm for GPU mining while being ASIC resistant. Miners can preserve their investment in GPU rigs, and for individuals, CPU mining is still feasible.
  6. Proof of Stake
    Proof of Stake will also be integrated when there is consensus regarding Casper or similar methods. A description of PoS can be found at https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ.
TLC Secure Network