SlideShare a Scribd company logo
Introduction to Decentralized
Internet
By
Priyabrata Dash
(@twitmyreview)
Agenda
• Centralized Internet’s Problems
• What is Decentralized Internet
• How Decentralized Internet Works
• The Hurdles to Be Cleared
• Examples
• The Future
Centralized Internet’s
Problems
• Relatively few large, physical servers (associated or
operated by relatively few large corporations) are
responsible for hosting essential elements of what
we consider the internet. These web hosting and
cloud computing servers are responsible for
keeping our email, social media, and webpages
available to all — and that means that the
companies that own those servers have an
outsized impact on how the internet runs.
• Few major vulnerabilities that will likely only get
worse in the near future
• Servers Can Go Down
• Servers Can Be Hacked
• Companies Throttle or Censor Data
• Companies Monetize Your Data
• Problem of network governance
• In the 21st century, a lack of personal privacy is just
the new normal. But it doesn’t have to be.
• The best entrepreneurs, developers, and investors
have become wary of building on top of centralized
platforms
What is Decentralized Internet
• Decentralized simply mean you and I can host the nodes (servers) and still we
can’t peek what’s getting stored or processed inside our nodes as its all encrypted
and a p2p protocol is ensuring the security and integrity of the data being passed
around.
• The vision is to replace today’s existing server centric and intrusive systems with a
fully decentralized and trustless network made up by the individual users who
contribute storage, computing power and bandwidth to form a world-wide
autonomous system.
• The technology that’s getting renewing excitement in the decentralized internet
in 2018 is Blockchain.
• A blockchain protocol is designed to allow transactions across a distributed
network without the need for a broker overseeing the process. Any information
can be observed by anyone, and is encoded in a way that won’t let anyone mess
with it.
• A decentralized application (Dapp, dApp or DApp) is an application that is run by
many users on a decentralized network with trustless protocols. They are
designed to avoid any single point of failure.
How Decentralized Internet
Works
• A decentralized version would rely on a
peer-to-peer network built on a
community of users. Their internet-
connected devices would host the
internet, not a group of more high-
powered servers. Each website would be
spread out across hundreds of nodes on
different devices, erasing the possibility
of a single server crashing due to, say, a
DDoS attack.
• People using mobile devices do not know
how much of their bandwidth lies idle
and is never used. decentralized Internet
will make use of this bandwidth to
provide Internet to everyone who signs
up for it. The current Internet will be
used just a stub so that people can
launch the decentralized Internet and
then go worry free.
• To put it in one line, you as a user will be
both a client and a server. Your devices’
will make use of idle bandwidth on other
connected mobile devices and in return,
will provide bandwidth of your device to
others. There won’t be possibilities of
hacking even though the devices will be
interconnected.
Examples - Zeronet
• ZeroNet launched that aims to deliver a
decentralized web platform using Bitcoin
cryptography and the BitTorrent
network.
• ZeroNet uses a combination of
BitTorrent, a custom file server and a
web based user interface to do so and
manages to provide a pretty usable
experience. The main goal of this project
is to host websites and provide
anonymity for each site’s owner.
• .BIT DOMAINS: Decentralized domains
using Namecoin cryptocurrency.
• ANONYMITY: You can easily hide your IP
address using the Tor network.
• OFFLINE: Browse the sites you're
seeding even if your internet connection
is down.
Example: Maidsafe
• MaidSafe — Massive Array of Internet Disks - Secure Access For Everyone. Maidsafe is
an open-source program (hosted on GitHub) that enables a decentralized Internet
platform.
• The key part of MaidSafe is its SAFE network, powered by its participants' computers,
which means, instead of specialized servers, data are stored and distributed by a
network of internet-connected computers.
• Anyone running MaidSafe program will become part of the SAFE Network. The
MaidSafe system turns all connected devices into SAFE Network nodes that collectively
store data for all MaidSafe users.
• Data storage is automatically decentralized, which means a web application using
MaidSafe does not store its user's data on any central server — rather the data is
spread across many disks and devices owned and managed by many different
MaidSafe users. Therefore, no one, whether it’s person or corporation, has an intact
copy of a user's file.
• Safecoin. The mechanism that incentivises the provision of resources by the network,
measuring and rewarding value without wasting any resources (no proof of work).
Example : IPFS
• Interplanetary File System, or IPFS, is an open source project that taps into
ideas pioneered by the decentralized digital currency Bitcoin and the peer-
to-peer file sharing system BitTorrent. Sites opt in to IPFS, and the protocol
distributes files among participating users. If the original web server goes
down, the site will live on thanks to the backups running on other people's
computers. What's more, these distributed archives will let people browse
previous versions of the site, much the way you can browse old edits in
Wikipedia or old versions of websites in the Wayback Machine.
• You need to have IPFS's software installed on your computer to take part.
But Benet says the team has already built a version of the software in
JavaScript that can run in your browser without the need to install any new
software at all. If it winds up on everyone's browsers, the idea goes, then
everyone can help back up the web.
Example: Dat Ptoject
• Dat is a nonprofit-backed data sharing protocol for applications of the future.
• Dat is a new p2p hypermedia protocol. It provides public-key-addressed file
archives which can be synced securely and browsed on-demand.
• By Improving speeds while using less bandwidth the Dat Protocol makes it the
default by using a peer-to-peer network and seamlessly add or remove hosts as
needed.
• Data is deduplicated between versions, reducing bandwidth costs and improving
speed. Developers can create custom storage that work over a variety of
protocols.
• Beaker: a decentralized, peer-to-peer web browser that lets you create and fork
websites
• Private Sharing: share files privately, encrypted with the secret URL.
Example: Freenet
• Freenet is a peer-to-peer platform for censorship-resistant
communication. It uses a decentralized distributed data
store to keep and deliver information, and has a suite of free
software for publishing and communicating on the Web
without fear of censorship.
• Freenet is different from most other peer-to-peer
applications, both in how users interact with it and in the
security it offers. It separates the underlying network
structure and protocol from how users interact with the
network; as a result, there are a variety of ways to access
content on the Freenet network. The simplest is via FProxy,
which is integrated with the node software and provides a
web interface to content on the network.
• While Freenet provides an HTTP interface for browsing
freesites, it is not a proxy for the World Wide Web; Freenet
can be used to access only the content that has been
previously inserted into the Freenet network. In this way, it is
more similar to Tor's hidden services than to anonymous
proxy software like Tor's proxy.
Example: Blockstack
• Blockstack is an open source project ($50M recent ICO)
that provides you a browser (called portal) to access the
information stored on the decentralized web.
• Blockstack works on existing TCP/IP networks, however, it
doesn’t use centralized DNS providers. Instead, it stores its
DNS indexes on multiple existing blockchains (such as
Ethereum) eliminating the need of centralized servers that
are prone to attacks and failures.
• Blockstack has developed an API layer called gaia that
remembers and ensures the integrity of the user
permission/data to access.
• There are virtual blockchains on top other blockchains that
handle the complex logic computation of the applications,
storing only the minimum and required data to the
Ethereum etc.
• Blockstack ensures that you are the owner of the file you
are claiming to be? A new identity structure. They ask you
to register a new identity on the blockstack using .ID
extension. Once you register that <yourname>.id on the
blockstack, you can use the same identity on all the apps
built on top of blockstack. Even if you don’t register, you
can use a hash to identify yourself.
The Hurdles to Be Cleared
• Few challenges still stand in
the way of a worldwide shift
to the decentralized flavor of
internet.
• Adaption
• Latency Problems
• Users Don’t Want the Extra
Responsibility
• The decentralized internet
remains a niche interest
closely allied with the
idiosyncratic world of
cryptocurrencies
Example: Ethereum
• The Ethereum project was, and is, one of the Internet's most
intriguing and inspiring experiments. It all begun back in 2013, when
researcher and prodigy programmer, Vitalik Buterin, proposed a way
to generalize the concept of the Bitcoin Blockchain, transforming it
from a decentralized bookkeeping ledger into a turing
complete virtual machine, or "World Computer", with the intention
to run applications, websites and even entire organizations, without
having to rely on server farms, as it is the case today.
• Similarly to the modern Internet, Ethereum has many different
components in order for it to work properly. Some of the
components of Ethereum are as follows:
• Accounts
• Validators (or so-called “miners”)
• Blockchain ledger
• Ethereum Virtual Machine (EVM)
• Browser (for DApps)
• Clients
• Full nodes
Conclusion
• “Web 3” — the third era of the internet
• On the vision of better decentralized web envisions, users control where their
data is stored and how it's accessed.
• Cryptocurrency & Decentralized Internet are intriguing methods of
deregulating an essential aspect of modern life and they share the same
DNA.
• Decentralized networks aren’t a silver bullet that will fix all the problems on
the internet. But they offer a much better approach than centralized systems.

More Related Content

More from Priyab Satoshi

Kademlia introduction
Kademlia introductionKademlia introduction
Kademlia introduction
Priyab Satoshi
 
Decentralised Exchanges - An Introduction
Decentralised Exchanges - An IntroductionDecentralised Exchanges - An Introduction
Decentralised Exchanges - An Introduction
Priyab Satoshi
 
Introduction to Segwit
Introduction to SegwitIntroduction to Segwit
Introduction to Segwit
Priyab Satoshi
 
On-chain Crowdfunding & Asset Token
On-chain Crowdfunding & Asset Token On-chain Crowdfunding & Asset Token
On-chain Crowdfunding & Asset Token
Priyab Satoshi
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchain
Priyab Satoshi
 
Blockchain and Decentralization
Blockchain and DecentralizationBlockchain and Decentralization
Blockchain and Decentralization
Priyab Satoshi
 
Erc 721 tokens
Erc 721 tokensErc 721 tokens
Erc 721 tokens
Priyab Satoshi
 
Cryptocurrency & Regulatory Environment
Cryptocurrency & Regulatory EnvironmentCryptocurrency & Regulatory Environment
Cryptocurrency & Regulatory Environment
Priyab Satoshi
 
Understanding blockchain
Understanding blockchainUnderstanding blockchain
Understanding blockchain
Priyab Satoshi
 

More from Priyab Satoshi (9)

Kademlia introduction
Kademlia introductionKademlia introduction
Kademlia introduction
 
Decentralised Exchanges - An Introduction
Decentralised Exchanges - An IntroductionDecentralised Exchanges - An Introduction
Decentralised Exchanges - An Introduction
 
Introduction to Segwit
Introduction to SegwitIntroduction to Segwit
Introduction to Segwit
 
On-chain Crowdfunding & Asset Token
On-chain Crowdfunding & Asset Token On-chain Crowdfunding & Asset Token
On-chain Crowdfunding & Asset Token
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchain
 
Blockchain and Decentralization
Blockchain and DecentralizationBlockchain and Decentralization
Blockchain and Decentralization
 
Erc 721 tokens
Erc 721 tokensErc 721 tokens
Erc 721 tokens
 
Cryptocurrency & Regulatory Environment
Cryptocurrency & Regulatory EnvironmentCryptocurrency & Regulatory Environment
Cryptocurrency & Regulatory Environment
 
Understanding blockchain
Understanding blockchainUnderstanding blockchain
Understanding blockchain
 

Recently uploaded

This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 

Recently uploaded (20)

This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 

Introduction to Decentralized Internet

  • 2. Agenda • Centralized Internet’s Problems • What is Decentralized Internet • How Decentralized Internet Works • The Hurdles to Be Cleared • Examples • The Future
  • 3. Centralized Internet’s Problems • Relatively few large, physical servers (associated or operated by relatively few large corporations) are responsible for hosting essential elements of what we consider the internet. These web hosting and cloud computing servers are responsible for keeping our email, social media, and webpages available to all — and that means that the companies that own those servers have an outsized impact on how the internet runs. • Few major vulnerabilities that will likely only get worse in the near future • Servers Can Go Down • Servers Can Be Hacked • Companies Throttle or Censor Data • Companies Monetize Your Data • Problem of network governance • In the 21st century, a lack of personal privacy is just the new normal. But it doesn’t have to be. • The best entrepreneurs, developers, and investors have become wary of building on top of centralized platforms
  • 4. What is Decentralized Internet • Decentralized simply mean you and I can host the nodes (servers) and still we can’t peek what’s getting stored or processed inside our nodes as its all encrypted and a p2p protocol is ensuring the security and integrity of the data being passed around. • The vision is to replace today’s existing server centric and intrusive systems with a fully decentralized and trustless network made up by the individual users who contribute storage, computing power and bandwidth to form a world-wide autonomous system. • The technology that’s getting renewing excitement in the decentralized internet in 2018 is Blockchain. • A blockchain protocol is designed to allow transactions across a distributed network without the need for a broker overseeing the process. Any information can be observed by anyone, and is encoded in a way that won’t let anyone mess with it. • A decentralized application (Dapp, dApp or DApp) is an application that is run by many users on a decentralized network with trustless protocols. They are designed to avoid any single point of failure.
  • 5. How Decentralized Internet Works • A decentralized version would rely on a peer-to-peer network built on a community of users. Their internet- connected devices would host the internet, not a group of more high- powered servers. Each website would be spread out across hundreds of nodes on different devices, erasing the possibility of a single server crashing due to, say, a DDoS attack. • People using mobile devices do not know how much of their bandwidth lies idle and is never used. decentralized Internet will make use of this bandwidth to provide Internet to everyone who signs up for it. The current Internet will be used just a stub so that people can launch the decentralized Internet and then go worry free. • To put it in one line, you as a user will be both a client and a server. Your devices’ will make use of idle bandwidth on other connected mobile devices and in return, will provide bandwidth of your device to others. There won’t be possibilities of hacking even though the devices will be interconnected.
  • 6. Examples - Zeronet • ZeroNet launched that aims to deliver a decentralized web platform using Bitcoin cryptography and the BitTorrent network. • ZeroNet uses a combination of BitTorrent, a custom file server and a web based user interface to do so and manages to provide a pretty usable experience. The main goal of this project is to host websites and provide anonymity for each site’s owner. • .BIT DOMAINS: Decentralized domains using Namecoin cryptocurrency. • ANONYMITY: You can easily hide your IP address using the Tor network. • OFFLINE: Browse the sites you're seeding even if your internet connection is down.
  • 7. Example: Maidsafe • MaidSafe — Massive Array of Internet Disks - Secure Access For Everyone. Maidsafe is an open-source program (hosted on GitHub) that enables a decentralized Internet platform. • The key part of MaidSafe is its SAFE network, powered by its participants' computers, which means, instead of specialized servers, data are stored and distributed by a network of internet-connected computers. • Anyone running MaidSafe program will become part of the SAFE Network. The MaidSafe system turns all connected devices into SAFE Network nodes that collectively store data for all MaidSafe users. • Data storage is automatically decentralized, which means a web application using MaidSafe does not store its user's data on any central server — rather the data is spread across many disks and devices owned and managed by many different MaidSafe users. Therefore, no one, whether it’s person or corporation, has an intact copy of a user's file. • Safecoin. The mechanism that incentivises the provision of resources by the network, measuring and rewarding value without wasting any resources (no proof of work).
  • 8. Example : IPFS • Interplanetary File System, or IPFS, is an open source project that taps into ideas pioneered by the decentralized digital currency Bitcoin and the peer- to-peer file sharing system BitTorrent. Sites opt in to IPFS, and the protocol distributes files among participating users. If the original web server goes down, the site will live on thanks to the backups running on other people's computers. What's more, these distributed archives will let people browse previous versions of the site, much the way you can browse old edits in Wikipedia or old versions of websites in the Wayback Machine. • You need to have IPFS's software installed on your computer to take part. But Benet says the team has already built a version of the software in JavaScript that can run in your browser without the need to install any new software at all. If it winds up on everyone's browsers, the idea goes, then everyone can help back up the web.
  • 9. Example: Dat Ptoject • Dat is a nonprofit-backed data sharing protocol for applications of the future. • Dat is a new p2p hypermedia protocol. It provides public-key-addressed file archives which can be synced securely and browsed on-demand. • By Improving speeds while using less bandwidth the Dat Protocol makes it the default by using a peer-to-peer network and seamlessly add or remove hosts as needed. • Data is deduplicated between versions, reducing bandwidth costs and improving speed. Developers can create custom storage that work over a variety of protocols. • Beaker: a decentralized, peer-to-peer web browser that lets you create and fork websites • Private Sharing: share files privately, encrypted with the secret URL.
  • 10. Example: Freenet • Freenet is a peer-to-peer platform for censorship-resistant communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship. • Freenet is different from most other peer-to-peer applications, both in how users interact with it and in the security it offers. It separates the underlying network structure and protocol from how users interact with the network; as a result, there are a variety of ways to access content on the Freenet network. The simplest is via FProxy, which is integrated with the node software and provides a web interface to content on the network. • While Freenet provides an HTTP interface for browsing freesites, it is not a proxy for the World Wide Web; Freenet can be used to access only the content that has been previously inserted into the Freenet network. In this way, it is more similar to Tor's hidden services than to anonymous proxy software like Tor's proxy.
  • 11. Example: Blockstack • Blockstack is an open source project ($50M recent ICO) that provides you a browser (called portal) to access the information stored on the decentralized web. • Blockstack works on existing TCP/IP networks, however, it doesn’t use centralized DNS providers. Instead, it stores its DNS indexes on multiple existing blockchains (such as Ethereum) eliminating the need of centralized servers that are prone to attacks and failures. • Blockstack has developed an API layer called gaia that remembers and ensures the integrity of the user permission/data to access. • There are virtual blockchains on top other blockchains that handle the complex logic computation of the applications, storing only the minimum and required data to the Ethereum etc. • Blockstack ensures that you are the owner of the file you are claiming to be? A new identity structure. They ask you to register a new identity on the blockstack using .ID extension. Once you register that <yourname>.id on the blockstack, you can use the same identity on all the apps built on top of blockstack. Even if you don’t register, you can use a hash to identify yourself.
  • 12. The Hurdles to Be Cleared • Few challenges still stand in the way of a worldwide shift to the decentralized flavor of internet. • Adaption • Latency Problems • Users Don’t Want the Extra Responsibility • The decentralized internet remains a niche interest closely allied with the idiosyncratic world of cryptocurrencies
  • 13. Example: Ethereum • The Ethereum project was, and is, one of the Internet's most intriguing and inspiring experiments. It all begun back in 2013, when researcher and prodigy programmer, Vitalik Buterin, proposed a way to generalize the concept of the Bitcoin Blockchain, transforming it from a decentralized bookkeeping ledger into a turing complete virtual machine, or "World Computer", with the intention to run applications, websites and even entire organizations, without having to rely on server farms, as it is the case today. • Similarly to the modern Internet, Ethereum has many different components in order for it to work properly. Some of the components of Ethereum are as follows: • Accounts • Validators (or so-called “miners”) • Blockchain ledger • Ethereum Virtual Machine (EVM) • Browser (for DApps) • Clients • Full nodes
  • 14. Conclusion • “Web 3” — the third era of the internet • On the vision of better decentralized web envisions, users control where their data is stored and how it's accessed. • Cryptocurrency & Decentralized Internet are intriguing methods of deregulating an essential aspect of modern life and they share the same DNA. • Decentralized networks aren’t a silver bullet that will fix all the problems on the internet. But they offer a much better approach than centralized systems.