THE INVISIBLE INTERNET™
PASSPORT TO THE MULTIVERSE

NVIS

NVIS ICO Progress
 
4,000 ETH 100,000 ETH
BUY NVIS

Introducing NVIS

Problem

______________

More of our lives are transferred onto the Internet daily. This creates more opportunity for our data to be stolen, hacked, filtered or misused. Privacy has become almost impossible. There is also increased data vulnerability. One of the main forces driving the market for privacy and security solutions is the vast market to collect or steal and sell personal information.

Vulnerabilities in TCP/IP network services can be a major weakness in blockchain networks. Network vulnerability scanners, such as Nessus by Tenable, and online databases, including Common Vulnerabilities and Exposures (CVE) contain thousands of publicly known vulnerabilities, exploits, backdoors, and trojans in network services and applications. The Internet is founded on TCP/IP, and the vast body of network implementations and applications make it infeasible to use other protocols. Because of the diversity of hosts and network configurations, each blockchain node is managed by different individuals and organizations that have wide variance in the level of sophistication of administrators with respect to network security..

Despite the blockchain scale, nodes are individually subject to Denial of Service attacks that can take down strategically significant nodes and risk overwhelming other nodes as transactions are processed suboptimally. One example of this is Bitcoin Unlimited, which was brought down in 2017 when a DDoS attack took down 500 of 800 nodes, causing a cascade overload of other nodes and massive backlog in transaction processing.

VPN can be used to provide a security layer to both private and public networks such as WiFi Hotspots and the Internet. Organizations operating in healthcare and telecommunication industry deal with sensitive information that needs to be protected constantly. Hackers are mostly targeting these industries due to very high price of data in black market. The same study shows that “currently, the world is experiencing more than half million attacks every minute, which will rise due to high technology proliferation”.

Solution

______________

The solution NVIS proposes is to provide a whole new Internet with security and privacy built-in. It utilizes the existing Internet infrastructure but proovides an overlay network that can't be seen on the Internet. It is a distributed network of VPNs with decentralized management and control. Each node is integrated to our own blockchain and provides peer-to-peer Layer 2 encryption between nodes to make a vast network. The NVIS apps are pure layer 2 VPNs so from the inner perspective of the node, all TCP ports are available as normal.

From the outer perspective of the node (the Internet side), the IP and everything above it is visible only to a community of peers.

THE BENEFITS OF THIS ARCHITECTURE INCLUDE:

VALUE PROPOSITIONS

______________

HOW IT WORKS

______________

NVIS service consumers find and pay service providers in Invisible Internet by using built-in smart contract based Identity, Service Discovery and Payment services. The network itself is cloaked, and nodes use the Ethereum blockchain for censorship resilient distributed storage and transactional processing needs. NVIS will use Registered Identities to enable means of creating limited trust when engaging with services and account payments.

CORE COMPONENTS:

Decentralized

The Invisible Internet is powered by NVIS, a layer 2 networking. Infinitely Scalable. with a peer to peer connection, there is no single point of failure.

Open Source

In order to maintain network transparency, the source code is 100% visible so we can continue to improve as a community. Join our team on GitHub or Slack.

Secure

The core of the network is based off of the SafeConnect VPN which has been operated & industry test. A powerful network that ensures secuirty on a commercial scale.

COMPREHENSIVE ANALYSIS

______________

Centralized VPN TOR Network NVIS
Port Clocking NO NO YES
Decentralized Traffic Routing NO YES YES
Possibility for end to end protection NO YES YES
Spoofing Risk HIGH LOW LOW
Network Participants incentivised NO NO YES
Open Source NO YES YES
Speed HIGH LOW HIGH/MEDIUM
Platform As A Service NO NO YES
Named Groups NO NO YES

VULNERABILITY ASSESSMENT SUMMARY

______________

TESTED ATTACKS NVIS app IPsec VPN Client
Surveillance FAIL
IP Header FAIL
DDOS FAIL
PayLoad Monitor
ARP Cache FAIL
Main in the middle FAIL
Alleviated Threats 92% 17%

ROAD MAP

______________

Development of Infastructure

Completed

The required IT infrastructure to support supernodes in 3 continents has already been developed and is available as a minimal viable product (MVP) in the form of the Invisible Internet and NVIS apps. with Ethereum private blockchain to support NVIS tokens and Custom ETH.

Try the NVIS Beta

Pre-ICO

Tokens will be distributed to represent 10% of the supply and the price of the ICO.

Trading capability

Convenient NVIS smartphone wallets and listing on exchanges will permit NVIS to expand market capitalization.

Initial Coin Offering

30% of the tokens will be distributed to solve the capital issue so that we can improve and expand the network.

Token redeeming

After the ICO, private blockchain use-tokens issued for bounties, etc. can be redeemed for NVIS trading tokens. This will allow us to offer high value services.

Blockchain hosting

The launch of services related to blockchain hosting and alternative crypto token support.

New type of money

The synergy between blockchain hosting and payment products will offer new types of services linked usage tokens as a medium of exchange.

TOKEN

______________

The ERC20 token NVIS will be used to access the network and to pay for premium services and content. The ecosystem for token use is:

. Token name: Invisible Internet
. Ticker: NVIS
. Platform: Ethereum
. Type: Utility
. Total supply: 100 000 000 NVIS
. Softcap: 500 ETH
. Hardcap: 5 000 ETH
. Token Sale: 20.06 - N/A
. Accepted purchase:  ETH, BTC
. Price: 1 NVIS = 0.012 - 0.017 ETH
. Minimum investment:    0.1 ETH
. Whitelist/KYC: Yes
. Restricted areas: USA, China, Korea, Pakistan

TOKEN ALLOCATION

______________
. Pre-sale   
|||||   5%
. Private-Sale   
||||||||||   10%
. Public sale   
|||||||||||||||||||||||||   25%
. Bounties and advisors   
|||||   5%
. Team and planned employees   
||||||||||||||||||||   20%
. Reserve for Future Expansion   
|||||||||||||||||||||||||   25%
. Founders   
||||||||||   10%

FUNDS DISTRIBUTION

______________
. Core development     
||||||||||||||||||||||||||||||||||||||||   40%
. Operational   
|||||||||||||||||||||||||   25%
. Marketing and sales   
|||||||||||||||||||||||||   25%
. Legal and compliance   
||||||||||   10%

TOKEN SALE

______________

PHASE DURATION TOKEN AVAILABLE PRICE SOFTCAP
Pre-ICO 20.06 - 01.08 2 500 000 NVIS 1 NVIS = 0.012 - 0.017 ETH 500 ETH
Token-Sale N/A N/A N/A N/A

BUY NVIS

Bounty Campaign

Official NVIS Bounty campaign : NVIS Tokens (~1000 ETH) are waiting for you!

Frequently Asked Questions

______________

Yes. By default, the NVIS apps and router connects to a "public" NVIS network. That allows your to provide or access content with the biggest audience. The "private" NVIS are the communities you create and available only to those with whom you give your own unique shared-secret. NOTE: we're working on a feature called "Smart Access Control", that will allow you to build rules and whitelists as smart contracts to access your communities via events or identity.
No. The NVIS app (SafeConnect) will allow you to connect your Windows, MacOS or Linux computers to the Invisible Internet.
COMING SOON: We will offer NVIS VPN to allow your device to connect to other nodes on the Invisible Internet that are on the Internet for remote browsing or access that may be banned or blocked in your country.
We will release our Android app soon, and will have an iOS version in the future. You CAN however, access via any smartphone and many devices using the NVIS router, or contact us about our proxy server configuration.

CORE TEAM

______________

John Matthesen ,CEO

John is a serial entrepreneur, with global operations and sales experience in the US, Europe and Asia. As part of the startup teams at Sybase and Commerce One, he held numerous positions, including CIO, VP of Asia...


Phil Smith,CTO

Phil is Founder and chief architect with expertise in security, networking, ISP and blockchain. He has overr 30 years in lead roles at NASA, HP, Cisco, Lawrence Livermore National Lab and other research labs and commercial projects as well as Space Shuttle and satellite communications and large network projects.


Larry Karisny,CBDO

Larry is an author and expert in Smart Grid and critical infrastructure. Founder/director of ProjectSafety, a non-profit organization. Larry brings 20 years experience in a variety of local wireline and wireless network....


Rob Langhorne

Analytical, highly adaptable professional with extensive experience leading ground-breaking development in mobile computing.and security..


Chris Rhodes

Principal Software Engineer with over 30 years of experience in systems level software, device drivers, operating systems (desktop & embedded), storage, high performance I/O and distributed systems.


Arsalan Masood

Mascot Enterprises - Offshore Partner, Full Stack Developer and Embedded Engineer


Evgeniy Kalashnikov Network Architect

Expertise in multi-platform network configuration, protocol stacks and VPN products and systems architecture.


Khalid Usman

PhD candidate, AI Expert Android and iOS / iPhone application developer


ADVISORS

______________

Taher Elgamal

Dr. Elgamal is world renown in the industry as the inventor of Secure Sockets Layer (SSL), a protocol developed by Netscape for transmitting private documents via the Internet. Elgamal also wrote the SSL patent and promoted SSL and has a lifefime achievement award from RSA.


John Vigouroux

CEO & Co-Founder at Nex Cubed. Former CEO of Cranite Systems and CEO of M86 Security, (acquired by Trustwave) joined as an advisor.


Manoj Bhatia

Worldwide Sales and Business Development Leader Cisco Systems. Former Director Smart Grid Strategic Alliances, GE Digital Energy.


Tony Flick

Principle at FYRM Associates. Specializes inApplication Security, Application Architecture, Network Security, Wireless Security, Vulnerability Assessments, Penetration Testing, Social Engineering, Physical Security, Secure Systems.


Guru Yeleswarapu

Gurumurthy Yeleswarapu has over 20 years of experience in Networking, Security and Mobile technologies. Founded couple of companies Efftronics Inc., (Which was sold in 1999) and e-Colt systems Inc.,...


Bill Melendez

Founder and CEO of HEMS Technology, industrial and consumer electronics smart home devices. Expert in sales and sales process.


PARTNERS

______________

Cisco Systems, Inc. is an American multinational technology conglomerate headquartered and manufactures.

Hewlett Packard is an American multinational Information Technology organization that provide businesses.

Texas Instruments Inc. (TI) is an American technology company that designs and manufactures semiconductors.

The 68HC08 (HC08 in short) is a broad family of 8-bit microcontrollers from Freescale Semiconductor.

Gateworks was founded by Gordon Edmonds in 1996 and initially focused on embedded software and firmware development.


TLC Secure, Inc. 2018 © All rights reserved