SlideShare a Scribd company logo
ZeroNet
Decentralized web platform
using Bitcoin cryptography
and BitTorrent network.
ABOUT ZERONET
Why?
We believe in open, free, and
uncensored network and
communication.
◦ No hosting costs
Sites are served by visitors.
◦ Impossible to shut down
It's nowhere because it's
everywhere.
◦ No single point of failure
Site remains online so long as at
least 1 peer serving it.
◦ Fast and works offline
You can access the site even if
your internet is unavailable.
Current features
◦ Real-time updated sites
◦ Namecoin .bit domain
support
◦ Multi-user sites
◦ Password less, Bitcoin's
BIP32-based authorization
◦ Built-in SQL server with P2P
data synchronization
◦ Tor network support
◦ Works in any browser/OS
◦ Open proxies: Try it without
any download anything.
HOW DOES IT WORK?
THE BASICS OF ASYMMETRIC CRYPTOGRAPHY
When you create a new site you get two keys:
◦ Only you have it
◦ Allows you to sign new content
for your site.
◦ No central registry
It never leaves your computer.
◦ Impossible to modify your site
without it.
◦ This is your site address
◦ Using this anyone can verify
if the file is created by the
site owner.
◦ Every downloaded file is
verified, makes it safe from
malicious code inserts or any
modifications.
Private key Public key
MORE INFO ABOUT CRYPTOGRAPHY OF ZERONET
◦ ZeroNet uses the same elliptic curve
based encryption as in your Bitcoin
wallet.
◦ You can accept payments directly to
your site address.
◦ Using the current fastest
supercomputer, it would take around 1
billion years to "hack" a private key.
WHAT HAPPENS WHEN YOU
VISIT A ZERONET SITE?
Please send some IP addresses for site
1EU1tbG9oC1A8jz2ouVwGZyQ5asrNsE4Vr
OK, Here are some:
12.34.56.78:13433, 42.42.42.42:13411, ...
WHAT HAPPENS WHEN YOU VISIT A ZERONET SITE? (1/2)
You
BitTorrent
tracker
1 Gathering visitors IP addresses:
◦ Asks visitors IP addresses from the BitTorrent trackers.
◦ Also registers you as a visitor.
◦ Tracker-less peer exchange also supported.
Please send me the file content.json
WHAT HAPPENS WHEN YOU VISIT A ZERONET SITE? (2/2)
Other visitors
2 Downloading site's files
1. Downloads a file named content.json, which holds all other file-
names, hashes and the site owner's cryptographic signature.
2. Verifies the downloaded content.json file using the site's
address and the site owner's signature from the file.
3. Downloads other files (html, css, js,...) and verifies them using
the SHA512 hash from the content.json file.
I have this: [Content of the file]
You
OK, the file is valid, saving to HDD.
Downloading other files of the site...
EXAMPLE OF GENERATED CONTENT.JSON FILE
{
"address": "1Name2NXVi1RDPDgf5617UoW7xA6YrhM9F",
"title": "ZeroName",
"description": "Namecoin address registry",
"files": {
"css/all.css": {
"sha512": "f00818c5b52013a467dc1883214b57cf6ac3dbe6da2df3f0af3cb232cd74877b",
"size": 69952
},
"data/names.json": {
"sha512": "341e4b1eb28a9aebef1ff86c981288b7531ec957552cf9a675c631d1797a48df",
"size": 1002
},
"index.html": {
"sha512": "b3fd5f2e61666874b06cc08150144015c0e88c45d3e7847ff8d4c641e789807d",
"size": 2160
},
"js/all.js": {
"sha512": "4426ca2dfacd524fb995c9f7522ca4e6f70c3e524b4bd8ca67f6416f93fca111",
"size": 90523
}
},
"signers_sign": "HOKZByY9pO2Iqh5UE+Nb7N5qb2cTvhULB3euvszufDnGIVeF4mswur3PyXxGXM+tJ8kZOFzspFRIl0gOyCE0tCM=",
"signs": {
"1Name2NXVi1RDPDgf5617UoW7xA6YrhM9F": "G6X42ZmEBf66jjylSnx45Uee9J+QO7dLt1CLYULI17L78AFaUDVHYohEYUGxAFqKx75UpWGsPGSY1S7lr/Fe3EU="
},
"signs_required": 1,
"ignore": "(js|css)/(?!all.(js|css))",
"modified": 1429483269.681872,
"zeronet_version": "0.2.9"
}
MORE INFO ABOUT SITE VISITS
◦ You start serving sites as soon as you
visit them.
◦ The downloads are prioritized for the
fastest web experience.
◦ You can use the Tor network to hide your
real IP address.
◦ Optional files also supported which are
only downloaded if your browser
requests them.
WHAT ABOUT SITE UPDATES?
Hello, here is a new content.json
ZERONET SITE UPDATES
Site visitors
The site owner signs the new content.json, then..
1. The site owner sends the new content.json to a few
number of visitors.
2. The visitor checks if it's newer than his/her current file.
3. The visitor downloads the changed files.
4. Then he/she sends the update to other visitors.
Thanks! It's valid and newer than mine.
Please send me this file: index.html
Site owner
Hello, here is a
new content.json
MORE INFO ABOUT ZERONET SITE UPDATES
◦ The browser is notified immediately about
the file changes using the WebSocket API.
This allows real-time updated sites.
◦ Multi-signature sites are also possible.
◦ For faster and easier data access the json
files can be automatically mapped to a
built-in SQL database.
MULTI-USER SITES
I want to post
on your site.
My auth address is:
16Y..sjZ.
MULTI-USER ZERONET SITES
Site visitors
Requesting permission from site owner:
1. Sending your auth address to site owner.
2. The site owner creates a new file and set your auth
address as the valid signer.
3. The site owner publishes the new file and the changed
permissions to visitors of the site.
You Site owner
From now the file
data/16Y..sjZ.json
can be signed by
the key 16Y..sjZ
MORE INFO ABOUT MULTI-USER ZERONET SITES
◦ You can skip the registration process by
trusting other site's users using the
authorization provider feature.
◦ The site owner is able to remove
misbehaving users.
◦ The user files size can be limited to help
avoid spamming.
◦ An unique, BIP32 based, valid Bitcoin
address generated for every user of the
site.
CURRENT STATUS AND PLANS
CURRENT STATUS
Development
Started
2014
Dec 20
First
version
2015
Jan 12
Multi-user
sites
Feb 9
SQLite
database
Mar 20
Namecoin
domains
Mar 31
Tor network,
Peer exchange
Apr 16
◦ Focus on content: Social network, Github alternative,
News site, Marketplace, etc...
◦ Torrent-like file splitting
◦ Password or public key based private sites
◦ I2P networks support
FUTURE PLANS
Auth.
providers
May 25
Encrypted
connections
June 10
Optional
files
Nov 9
AES & ECIES
ZeroMail
Dec 10
Full Tor
support
2016
Jan 5
News feed
Feb 2
ZERONET IS...
◦ An alternative web distribution platform.
◦ Focused on speed, usability and user
experience.
◦ Not trying to compete with 10+ year old
projects. (Freenet, I2P)
◦ Not more anonymous than BitTorrent.
(you can use Tor to hide your IP)
◦ Not a replacement for the current
client <> server based model.
OTHER BENEFITS OF ZERONET
1. 100% transparent sites: Anyone able to audit the
full working mechanism.
2. 1 click site cloning: Create your own copy of any
site.
3. No backend code: Query and execute SQL
commands directly from javascript with zero
network latency.
4. Instant CDN: Your content is distributed around the
world.
5. Zero discrimination: Same, zero cost infrastructure
and opportunity for anyone around the world.
6. Zero trust: Impossible to modify your site without
the private key.
Thanks!
YOU CAN START USING
ZERONET TODAY
http://zeronet.io
@HelloZeroNet
/r/ZeroNet
#ZeroNet @ freenode
Presentation template by SlidesCarnival

More Related Content

Viewers also liked

AppleTree_2007Early_Learning_Public_Charter_School_-_condensed
AppleTree_2007Early_Learning_Public_Charter_School_-_condensedAppleTree_2007Early_Learning_Public_Charter_School_-_condensed
AppleTree_2007Early_Learning_Public_Charter_School_-_condensed
Mary Beth Levin
 
Evaluation | Question 6
Evaluation | Question 6 Evaluation | Question 6
Evaluation | Question 6
charlieharrisops
 
RHINO LOGY INSTRUMENTS [SURGICOSE]
RHINO LOGY INSTRUMENTS [SURGICOSE]RHINO LOGY INSTRUMENTS [SURGICOSE]
RHINO LOGY INSTRUMENTS [SURGICOSE]
SURGICOSE
 
Φ.80020/ΟΙΚ.59590/Δ15.1006
Φ.80020/ΟΙΚ.59590/Δ15.1006Φ.80020/ΟΙΚ.59590/Δ15.1006
Φ.80020/ΟΙΚ.59590/Δ15.1006
Panayotis Sofianopoulos
 
Theory and App Presentation 1st May 2014
Theory and App Presentation 1st May 2014Theory and App Presentation 1st May 2014
Theory and App Presentation 1st May 2014
Jemma Bateman
 
Alarm menggunakan HandPhone
Alarm menggunakan HandPhoneAlarm menggunakan HandPhone
Alarm menggunakan HandPhone
Leksono Mugi
 
Building A Modern Brand
Building A Modern BrandBuilding A Modern Brand
Building A Modern Brand
Michelle Jones, LLIF
 
Mgobel1 powerpoint_school_lunches
Mgobel1  powerpoint_school_lunchesMgobel1  powerpoint_school_lunches
Mgobel1 powerpoint_school_lunches
Mandy Gobel
 
michael resume2
michael resume2michael resume2
michael resume2
Michael Sanchez
 
Almoustafa_-2015_CV2nn
Almoustafa_-2015_CV2nnAlmoustafa_-2015_CV2nn
Almoustafa_-2015_CV2nn
Moustafa Gouda
 
Υπόμνημα ΕΣΕΕ προς ΔΝΤ
Υπόμνημα ΕΣΕΕ προς ΔΝΤΥπόμνημα ΕΣΕΕ προς ΔΝΤ
Υπόμνημα ΕΣΕΕ προς ΔΝΤ
Panayotis Sofianopoulos
 

Viewers also liked (11)

AppleTree_2007Early_Learning_Public_Charter_School_-_condensed
AppleTree_2007Early_Learning_Public_Charter_School_-_condensedAppleTree_2007Early_Learning_Public_Charter_School_-_condensed
AppleTree_2007Early_Learning_Public_Charter_School_-_condensed
 
Evaluation | Question 6
Evaluation | Question 6 Evaluation | Question 6
Evaluation | Question 6
 
RHINO LOGY INSTRUMENTS [SURGICOSE]
RHINO LOGY INSTRUMENTS [SURGICOSE]RHINO LOGY INSTRUMENTS [SURGICOSE]
RHINO LOGY INSTRUMENTS [SURGICOSE]
 
Φ.80020/ΟΙΚ.59590/Δ15.1006
Φ.80020/ΟΙΚ.59590/Δ15.1006Φ.80020/ΟΙΚ.59590/Δ15.1006
Φ.80020/ΟΙΚ.59590/Δ15.1006
 
Theory and App Presentation 1st May 2014
Theory and App Presentation 1st May 2014Theory and App Presentation 1st May 2014
Theory and App Presentation 1st May 2014
 
Alarm menggunakan HandPhone
Alarm menggunakan HandPhoneAlarm menggunakan HandPhone
Alarm menggunakan HandPhone
 
Building A Modern Brand
Building A Modern BrandBuilding A Modern Brand
Building A Modern Brand
 
Mgobel1 powerpoint_school_lunches
Mgobel1  powerpoint_school_lunchesMgobel1  powerpoint_school_lunches
Mgobel1 powerpoint_school_lunches
 
michael resume2
michael resume2michael resume2
michael resume2
 
Almoustafa_-2015_CV2nn
Almoustafa_-2015_CV2nnAlmoustafa_-2015_CV2nn
Almoustafa_-2015_CV2nn
 
Υπόμνημα ΕΣΕΕ προς ΔΝΤ
Υπόμνημα ΕΣΕΕ προς ΔΝΤΥπόμνημα ΕΣΕΕ προς ΔΝΤ
Υπόμνημα ΕΣΕΕ προς ΔΝΤ
 

Recently uploaded

DocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptxDocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptx
AmitTuteja9
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
Febless Hernane
 
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENTUnlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
rajesh344555
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
narwatsonia7
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENTUnlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
rajesh344555
 
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
Web Inspire
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
Emre Gündoğdu
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. ITNetwork Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Sarthak Sobti
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
Federico Ast
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 

Recently uploaded (15)

DocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptxDocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptx
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
 
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENTUnlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENTUnlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
 
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. ITNetwork Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 

ZeroNet - Decentralized p2p web platform

  • 1. ZeroNet Decentralized web platform using Bitcoin cryptography and BitTorrent network.
  • 2. ABOUT ZERONET Why? We believe in open, free, and uncensored network and communication. ◦ No hosting costs Sites are served by visitors. ◦ Impossible to shut down It's nowhere because it's everywhere. ◦ No single point of failure Site remains online so long as at least 1 peer serving it. ◦ Fast and works offline You can access the site even if your internet is unavailable. Current features ◦ Real-time updated sites ◦ Namecoin .bit domain support ◦ Multi-user sites ◦ Password less, Bitcoin's BIP32-based authorization ◦ Built-in SQL server with P2P data synchronization ◦ Tor network support ◦ Works in any browser/OS ◦ Open proxies: Try it without any download anything.
  • 3. HOW DOES IT WORK?
  • 4. THE BASICS OF ASYMMETRIC CRYPTOGRAPHY When you create a new site you get two keys: ◦ Only you have it ◦ Allows you to sign new content for your site. ◦ No central registry It never leaves your computer. ◦ Impossible to modify your site without it. ◦ This is your site address ◦ Using this anyone can verify if the file is created by the site owner. ◦ Every downloaded file is verified, makes it safe from malicious code inserts or any modifications. Private key Public key
  • 5. MORE INFO ABOUT CRYPTOGRAPHY OF ZERONET ◦ ZeroNet uses the same elliptic curve based encryption as in your Bitcoin wallet. ◦ You can accept payments directly to your site address. ◦ Using the current fastest supercomputer, it would take around 1 billion years to "hack" a private key.
  • 6. WHAT HAPPENS WHEN YOU VISIT A ZERONET SITE?
  • 7. Please send some IP addresses for site 1EU1tbG9oC1A8jz2ouVwGZyQ5asrNsE4Vr OK, Here are some: 12.34.56.78:13433, 42.42.42.42:13411, ... WHAT HAPPENS WHEN YOU VISIT A ZERONET SITE? (1/2) You BitTorrent tracker 1 Gathering visitors IP addresses: ◦ Asks visitors IP addresses from the BitTorrent trackers. ◦ Also registers you as a visitor. ◦ Tracker-less peer exchange also supported.
  • 8. Please send me the file content.json WHAT HAPPENS WHEN YOU VISIT A ZERONET SITE? (2/2) Other visitors 2 Downloading site's files 1. Downloads a file named content.json, which holds all other file- names, hashes and the site owner's cryptographic signature. 2. Verifies the downloaded content.json file using the site's address and the site owner's signature from the file. 3. Downloads other files (html, css, js,...) and verifies them using the SHA512 hash from the content.json file. I have this: [Content of the file] You OK, the file is valid, saving to HDD. Downloading other files of the site...
  • 9. EXAMPLE OF GENERATED CONTENT.JSON FILE { "address": "1Name2NXVi1RDPDgf5617UoW7xA6YrhM9F", "title": "ZeroName", "description": "Namecoin address registry", "files": { "css/all.css": { "sha512": "f00818c5b52013a467dc1883214b57cf6ac3dbe6da2df3f0af3cb232cd74877b", "size": 69952 }, "data/names.json": { "sha512": "341e4b1eb28a9aebef1ff86c981288b7531ec957552cf9a675c631d1797a48df", "size": 1002 }, "index.html": { "sha512": "b3fd5f2e61666874b06cc08150144015c0e88c45d3e7847ff8d4c641e789807d", "size": 2160 }, "js/all.js": { "sha512": "4426ca2dfacd524fb995c9f7522ca4e6f70c3e524b4bd8ca67f6416f93fca111", "size": 90523 } }, "signers_sign": "HOKZByY9pO2Iqh5UE+Nb7N5qb2cTvhULB3euvszufDnGIVeF4mswur3PyXxGXM+tJ8kZOFzspFRIl0gOyCE0tCM=", "signs": { "1Name2NXVi1RDPDgf5617UoW7xA6YrhM9F": "G6X42ZmEBf66jjylSnx45Uee9J+QO7dLt1CLYULI17L78AFaUDVHYohEYUGxAFqKx75UpWGsPGSY1S7lr/Fe3EU=" }, "signs_required": 1, "ignore": "(js|css)/(?!all.(js|css))", "modified": 1429483269.681872, "zeronet_version": "0.2.9" }
  • 10. MORE INFO ABOUT SITE VISITS ◦ You start serving sites as soon as you visit them. ◦ The downloads are prioritized for the fastest web experience. ◦ You can use the Tor network to hide your real IP address. ◦ Optional files also supported which are only downloaded if your browser requests them.
  • 11. WHAT ABOUT SITE UPDATES?
  • 12. Hello, here is a new content.json ZERONET SITE UPDATES Site visitors The site owner signs the new content.json, then.. 1. The site owner sends the new content.json to a few number of visitors. 2. The visitor checks if it's newer than his/her current file. 3. The visitor downloads the changed files. 4. Then he/she sends the update to other visitors. Thanks! It's valid and newer than mine. Please send me this file: index.html Site owner Hello, here is a new content.json
  • 13. MORE INFO ABOUT ZERONET SITE UPDATES ◦ The browser is notified immediately about the file changes using the WebSocket API. This allows real-time updated sites. ◦ Multi-signature sites are also possible. ◦ For faster and easier data access the json files can be automatically mapped to a built-in SQL database.
  • 15. I want to post on your site. My auth address is: 16Y..sjZ. MULTI-USER ZERONET SITES Site visitors Requesting permission from site owner: 1. Sending your auth address to site owner. 2. The site owner creates a new file and set your auth address as the valid signer. 3. The site owner publishes the new file and the changed permissions to visitors of the site. You Site owner From now the file data/16Y..sjZ.json can be signed by the key 16Y..sjZ
  • 16. MORE INFO ABOUT MULTI-USER ZERONET SITES ◦ You can skip the registration process by trusting other site's users using the authorization provider feature. ◦ The site owner is able to remove misbehaving users. ◦ The user files size can be limited to help avoid spamming. ◦ An unique, BIP32 based, valid Bitcoin address generated for every user of the site.
  • 18. CURRENT STATUS Development Started 2014 Dec 20 First version 2015 Jan 12 Multi-user sites Feb 9 SQLite database Mar 20 Namecoin domains Mar 31 Tor network, Peer exchange Apr 16 ◦ Focus on content: Social network, Github alternative, News site, Marketplace, etc... ◦ Torrent-like file splitting ◦ Password or public key based private sites ◦ I2P networks support FUTURE PLANS Auth. providers May 25 Encrypted connections June 10 Optional files Nov 9 AES & ECIES ZeroMail Dec 10 Full Tor support 2016 Jan 5 News feed Feb 2
  • 19. ZERONET IS... ◦ An alternative web distribution platform. ◦ Focused on speed, usability and user experience. ◦ Not trying to compete with 10+ year old projects. (Freenet, I2P) ◦ Not more anonymous than BitTorrent. (you can use Tor to hide your IP) ◦ Not a replacement for the current client <> server based model.
  • 20. OTHER BENEFITS OF ZERONET 1. 100% transparent sites: Anyone able to audit the full working mechanism. 2. 1 click site cloning: Create your own copy of any site. 3. No backend code: Query and execute SQL commands directly from javascript with zero network latency. 4. Instant CDN: Your content is distributed around the world. 5. Zero discrimination: Same, zero cost infrastructure and opportunity for anyone around the world. 6. Zero trust: Impossible to modify your site without the private key.
  • 21. Thanks! YOU CAN START USING ZERONET TODAY http://zeronet.io @HelloZeroNet /r/ZeroNet #ZeroNet @ freenode Presentation template by SlidesCarnival