More of our lives are transferred onto the Internet daily. This creates more opportunity for our data to be stolen, hacked, filtered or misused. Privacy has become almost impossible. There is also increased data vulnerability. One of the main forces driving the market for privacy and security solutions is the vast market to collect or steal and sell personal information.
Vulnerabilities in TCP/IP network services can be a major weakness in blockchain networks. Network vulnerability scanners, such as Nessus by Tenable, and online databases, including Common Vulnerabilities and Exposures (CVE) contain thousands of publicly known vulnerabilities, exploits, backdoors, and trojans in network services and applications. The Internet is founded on TCP/IP, and the vast body of network implementations and applications make it infeasible to use other protocols. Because of the diversity of hosts and network configurations, each blockchain node is managed by different individuals and organizations that have wide variance in the level of sophistication of administrators with respect to network security..
Despite the blockchain scale, nodes are individually subject to Denial of Service attacks that can take down strategically significant nodes and risk overwhelming other nodes as transactions are processed suboptimally. One example of this is Bitcoin Unlimited, which was brought down in 2017 when a DDoS attack took down 500 of 800 nodes, causing a cascade overload of other nodes and massive backlog in transaction processing.
VPN can be used to provide a security layer to both private and public networks such as WiFi Hotspots and the Internet. Organizations operating in healthcare and telecommunication industry deal with sensitive information that needs to be protected constantly. Hackers are mostly targeting these industries due to very high price of data in black market. The same study shows that “currently, the world is experiencing more than half million attacks every minute, which will rise due to high technology proliferation”.
The solution NVIS proposes is to provide a whole new Internet with security and privacy built-in. It utilizes the existing Internet infrastructure but proovides an overlay network that can't be seen on the Internet. It is a distributed network of VPNs with decentralized management and control. Each node is integrated to our own blockchain and provides peer-to-peer Layer 2 encryption between nodes to make a vast network. The NVIS apps are pure layer 2 VPNs so from the inner perspective of the node, all TCP ports are available as normal.
From the outer perspective of the node (the Internet side), the IP and everything above it is visible only to a community of peers.
THE BENEFITS OF THIS ARCHITECTURE INCLUDE:
NVIS service consumers find and pay service providers in Invisible Internet by using built-in smart contract based Identity, Service Discovery and Payment services. The network itself is cloaked, and nodes use the Ethereum blockchain for censorship resilient distributed storage and transactional processing needs. NVIS will use Registered Identities to enable means of creating limited trust when engaging with services and account payments.
The Invisible Internet is powered by NVIS, a layer 2 networking. Infinitely Scalable. with a peer to peer connection, there is no single point of failure.
In order to maintain network transparency, the source code is 100% visible so we can continue to improve as a community. Join our team on GitHub or Slack.
The core of the network is based off of the SafeConnect VPN which has been operated & industry test. A powerful network that ensures secuirty on a commercial scale.
|Centralized VPN||TOR Network||NVIS|
|Decentralized Traffic Routing||NO||YES||YES|
|Possibility for end to end protection||NO||YES||YES|
|Network Participants incentivised||NO||NO||YES|
|Platform As A Service||NO||NO||YES|
|TESTED ATTACKS||NVIS app||IPsec VPN Client|
|Main in the middle||FAIL|
The required IT infrastructure to support supernodes in 3 continents has already been developed and is available as a minimal viable product (MVP) in the form of the Invisible Internet and NVIS apps. with Ethereum private blockchain to support NVIS tokens and Custom ETH.Try the NVIS Beta
Tokens will be distributed to represent 10% of the supply and the price of the ICO.
Convenient NVIS smartphone wallets and listing on exchanges will permit NVIS to expand market capitalization.
30% of the tokens will be distributed to solve the capital issue so that we can improve and expand the network.
After the ICO, private blockchain use-tokens issued for bounties, etc. can be redeemed for NVIS trading tokens. This will allow us to offer high value services.
The launch of services related to blockchain hosting and alternative crypto token support.
The synergy between blockchain hosting and payment products will offer new types of services linked usage tokens as a medium of exchange.
The ERC20 token NVIS will be used to access the network and to pay for premium services and content. The ecosystem for token use is:
|.||Token name:||Invisible Internet|
|.||Total supply:||100 000 000 NVIS|
|.||Hardcap:||5 000 ETH|
|.||Token Sale:||20.06 - N/A|
|.||Accepted purchase:||ETH, BTC|
|.||Price:||1 NVIS = 0.012 - 0.017 ETH|
|.||Minimum investment:||0.1 ETH|
|.||Restricted areas:||USA, China, Korea, Pakistan|
|.||Bounties and advisors
|.||Team and planned employees
|.||Reserve for Future Expansion
|.||Marketing and sales
|.||Legal and compliance
|Pre-ICO||20.06 - 01.08||2 500 000 NVIS||1 NVIS = 0.012 - 0.017 ETH||500 ETH|
John is a serial entrepreneur, with global operations and sales experience in the US, Europe and Asia. As part of the startup teams at Sybase and Commerce One, he held numerous positions, including CIO, VP of Asia...
Phil is Founder and chief architect with expertise in security, networking, ISP and blockchain. He has overr 30 years in lead roles at NASA, HP, Cisco, Lawrence Livermore National Lab and other research labs and commercial projects as well as Space Shuttle and satellite communications and large network projects.
Larry is an author and expert in Smart Grid and critical infrastructure. Founder/director of ProjectSafety, a non-profit organization. Larry brings 20 years experience in a variety of local wireline and wireless network....
Principal Software Engineer with over 30 years of experience in systems level software, device drivers, operating systems (desktop & embedded), storage, high performance I/O and distributed systems.
Expertise in multi-platform network configuration, protocol stacks and VPN products and systems architecture.
Dr. Elgamal is world renown in the industry as the inventor of Secure Sockets Layer (SSL), a protocol developed by Netscape for transmitting private documents via the Internet. Elgamal also wrote the SSL patent and promoted SSL and has a lifefime achievement award from RSA.
CEO & Co-Founder at Nex Cubed. Former CEO of Cranite Systems and CEO of M86 Security, (acquired by Trustwave) joined as an advisor.
Worldwide Sales and Business Development Leader Cisco Systems. Former Director Smart Grid Strategic Alliances, GE Digital Energy.
Gurumurthy Yeleswarapu has over 20 years of experience in Networking, Security and Mobile technologies. Founded couple of companies Efftronics Inc., (Which was sold in 1999) and e-Colt systems Inc.,...
Cisco Systems, Inc. is an American multinational technology conglomerate headquartered and manufactures.
Hewlett Packard is an American multinational Information Technology organization that provide businesses.
Texas Instruments Inc. (TI) is an American technology company that designs and manufactures semiconductors.
The 68HC08 (HC08 in short) is a broad family of 8-bit microcontrollers from Freescale Semiconductor.
Gateworks was founded by Gordon Edmonds in 1996 and initially focused on embedded software and firmware development.