Welcome to vision.network!

welcome.svg

Our Philosophy: Yearning for freedom

We are reconstructing the transport layer of the Internet, we are re-defining the Internet. Each user and each terminal is no longer just the bottom layer of the food chain, but should be the provider and co-builder of the Internet and services.

The Vision Network is a set of infrastructure for building a decentralized Internet. It is a distributed extensible virtual network, based on the physical network layer and the ISP network layer.

Vision Network uses blockchain technology, distributed networks and asymmetric encryption, provides distributed services such as Auto-Proxy, multi-layer anonymous network, IM, non-polluted DNS, even CDN and DDoS defense, etc.

The VOKEN – Unique token in the Vision Network ecosystem with stable value scale will be used in the entire ecology and produce an incentive effect. Everyone can participate in distributed network construction. We believe the Vision Network will make the future Internet more open, more equal, more stable, more efficient, safer and freer.

Early-Bird Sale

The VokenTB Early-Bird Sale process operates by a smart contract on Ethereum blockchain, with no other privileged access given to any party.

VokenTB Early-Bird Sale Contract is open-sourced under the GNU General Public License v3.0 and can be viewed on the github repository and etherscan.io. It ensures fairness and transparency, using ETH as the only payment medium.

And you can visit the Early-Bird Sale dApp or easily just send ETH to the contract address.

Only 10.5 Million VokenTB for Early-Bird Sale (5% of the total supply)

Service Value & Usage Value ANCHORING

  • 1 VokenTB = 1,000 GB general traffic, solid value base.

  • You can spend 1 VokenTB to exchange 1,000 GB general traffic to use the unblocked accessible Internet, or earn VokenTB by selling/sharing your idle bandwidth.

  • 1,000 GB is worth about $80 - 85 USD in mature IDCs and cloud service platforms, such as

Only 10.5 million VokenTB for this Early-Bird Sale

There are only 10.5 million VokenTB would released during this Early-Bird Sale.

Running by VokenTB Early-Bird Sale Contract on the Ethereum blockchain, to make sure it is clear and free to check at anytime.

Crypto-currency ETH will be used as the only payment medium to complete the Early-bird.

Realtime ETH price

Using ETH as the only payment medium, Ether USD Price Contracts will always provide the realtime price of ETH which is tracking the pair on UniSwap V2.

Incremental sales price: $0.5 - $0.7

Starting at 1 VokenTB = $0.5 USD, until the price reaches $0.7 USD.

The latest price depends on the percentage of sales progress, and you can always find it on the Early-Bird Sale dApp’s home page. The earlier the cheaper, the later the more expensive.

Limited sales

We hope that more users will hold VokenTB, which is more conducive to the entire ecosystem.

Therefore, during the early bird sales phase, there is a purchase amount limit for each address:

Sales progress

Payment limit

< 50%

0.1 - 1.0 ETH

>= 50%

0.1 - 0.5 ETH

Only one purchase per address is allowed.

Additional 1% - 10% bonus if you bind a referral address

If you have a referral address, bind it, then you can get an additional 1% - 10% random bonus (paid in VokenTB).

Vesting plan

Early bird has more advantages compared to the Public-Sale (coming soon). So most of the positions will be released in parallel with the users of the Public-Sale.

  • 10% released instantly

  • 90% released according the process of the Public-Sale

Referral reward: 22%

The VokenTB Early-Bird Sale Contract has a 10-levels referral system that rewards both the referrer and referee when a user reserves VokenTB tokens.

And the referral relationships will always be available, including the Public-Sale (coming soon).

During the Early-Bird Sale, 22% of sales revenue will be used as rewards:

Depth

Reward (paid in ETH)

Remark

0

10%

1

3%

2

2%

3

1%

Refer 3 or more ETH

4

1%

Refer 4 or more ETH

5

1%

Refer 5 or more ETH

6

1%

Refer 6 or more ETH

7

1%

Refer 7 or more ETH

8

1%

Refer 8 or more ETH

9

1%

Refer 9 or more ETH

Tell your friends and help them understand the project and the opportunity. By sharing your referral address (VOKEN wallet address), your friend will get an additional 1% - 10% random bonus, and you will earn 10% ETH reward.

  • Paid in ETH, will transfer to your wallet address automatically and immediately, process by VokenTB Early-Bird Sale Contract.

  • The referral relationship chain data will be saved in the voken_tb_contract on the Ethereum blockchain, which cannot be tampered.

  • Anyone who join the Early-Bird Sale (include the Public-Sale (coming soon)) by using your referral address, he will get the additional random bonus, you will get rewarded.

Referrals System

Help improve the vision network ecosystem, strengthen the network, promote consensus, and earn ETH.

We believe that a larger user base that understands the project’s value is the foundation of a healthy ecology.

So we’ve built a multi-levels referral system that rewards both the referrer and referee when a user reserves VokenTB tokens in VokenTB sales.

And the referral relationships will always be available, including the Early-Bird Sale and the Public-Sale (coming soon).

Early-Bird referral reward: 22%

The VokenTB Early-Bird Sale Contract has a 10-levels referral system.

During the Early-Bird Sale, 22% of sales revenue will be used as rewards:

Depth

Reward (paid in ETH)

Condition

0

10%

1

3%

2

2%

3

1%

Refer 3 or more ETH

4

1%

Refer 4 or more ETH

5

1%

Refer 5 or more ETH

6

1%

Refer 6 or more ETH

7

1%

Refer 7 or more ETH

8

1%

Refer 8 or more ETH

9

1%

Refer 9 or more ETH

Tell your friends and help them understand the project and the opportunity. By sharing your referral address (VOKEN wallet address), your friend will get an additional 1% - 10% random bonus, and you will earn 10% ETH reward.

  • Paid in ETH, will transfer to your wallet address automatically and immediately, process by VokenTB Early-Bird Sale Contract.

  • The referral relationship chain data will be saved in the voken_tb_contract on the Ethereum blockchain, which cannot be tampered.

  • Anyone who join the Early-Bird Sale (include the Public-Sale (coming soon)) by using your referral address, he will get the additional random bonus, you will get rewarded.

vnCHAIN Susitna launched (beta)

Susitna was launched in Aug 2020, for beta.

Contains:

  • Susitna AccountNetwork

  • Susitna ProxyNetwork

  • Susitna Proxy-ClientBase on Desktop OS

These repositories are already closed (without vnCHAIN):

  • VISION CONNECT (Alpha)

  • vnVPN (Alpha)

  • AutoSSR: FREE ShadowsocksR

  • Optimized shadowsocks

Note

Updating, will relaunch beta network in January 2021.

Alpha Testing VS. Beta Testing

Seems that many people do know alpha and beta (even never heard about?), here is a brief intro: What is the difference?

Alpha Testing

Alpha Testing is a type of acceptance testing; performed to identify all possible issues and bugs before releasing the final product to the end-users. Alpha testing is carried out by the testers, which are internal employees of the organization. The main goal is to identify the tasks that a typical user might perform and test them.

To put it as simple as possible, this kind of testing is called alpha only because it is done early on, near the end of the software development, and before beta testing. The main focus of alpha testing is to simulate real users using a black box and white box techniques.

Beta Testing

Beta Testing is performed by “real users” of the software application in a “real environment.” It can be considered a form of external User Acceptance Testing. It is the final test before shipping a product to the customers. Direct feedback from customers is a significant advantage of Beta Testing. This testing helps to test products in the customer’s environment.

Beta version of the software is released to a limited number of end-users of the product to obtain product quality feedback. Beta testing reduces product failure risks and provides increased quality of the work through customer validation.

vnCHAIN Susitna

(We hadn’t named the alpha stage without vnCHAIN.)

Sustina River is the 15th largest river int the United States (unfragmented), 313 miles long in South-central Alaska. The river stretches from the Susitna Glacier to Cook Inlet’s Knik Arm.

We named the beta stage Susitna after vnCHAIN had successfully networked and started to work (milestone). And it is not yet perfect. More extensive testing and feedback will help voken products mature quickly. Susitna will be the last test stage before the official release of the product. The first name of the official product will be Copper.

Note

For testing or updating purposes, the development team may restart vnCHAIN Susitna at any time, and your Susitna VOKEN balance (just beta, not real fund) may be rolled back.

Voken HD Wallet Toolkit

A toolkit to generate your key-pairs/addresses, validate address.

Voken HD Wallet Generator/Validator

To get some Susitna VOKEN for joining the test, just send your address to the Telegram group.

AccountNetwork

AccountNetwork temporarily not participated by users before prod.

T.B.C.

ProxyNetwork and ProxyContainers

The ProxyContainers would provide decentralized proxy services. The computer which running a ProxyCointainer could earn VOKEN by providing proxy service.

Will allow users to participate when the Proxy-ClientBase is relatively complete.

Proxy-ClientBase for PC

You can start a Proxy-ClientBase on your desktop or laptop PC now. It would provide a local Socks5 proxy for you, which is based on vnTUNNEL (encrypted).

Here is a brief_guide_for_launching_the_client_base

Voken HD Wallet Generator/Validator

BIP39 mnemonic

Mnemonic code for generating deterministic keys

BIP39: A group of easy to remember words – for the generation of deterministic wallets.

BIP32 HD Wallet

Hierarchical Deterministic Wallets

BIP32: Use the binary seed converted from a BIP39 mnemonic to generate hierarchical deterministic wallets.

BIP44 Multi-Account

Multi-Account Hierarchy for Deterministic Wallets

Voken was listed in SLIP-0044, with 678 as the coin_type value.

Its rootPath of BIP44 is m/44'/678'/0'/0/...

Read more at BIP44

Native checksum

A valid voken wallet address looks like: v8TX860N7Eu1jMv1yQJkb8fykXts2mVAG

It is a native checksum address. Any misspelling of even a single character will fail in address verification. This means that no Voken will be lost due to someone mistyped/pasted an wrong address.

ALPHABET for @voken/base32

@voken/base32 is human-friendly – you don’t have to worry about letters/numbers that are easy to confuse, making it easier to transmit in handwriting or typing over the phone.

The encoding alphabet consists of the numerals 0-9 and the letters a-z, excluding a few letters that might look like numbers, which we simply interpret as follows:

  • i, l -> 1

  • o -> 0

  • z -> 2

const ALPHABET = '0123456789abcdefghjkmnpqrstuvwxy'

Each character corresponds to 5 bits of input.

Lexicographic order of strings is preserved through Base 32 encoding.

vnCHAIN Account Network

AccountNetwork temporarily not participated by users before prod.

T.B.C.

ProxyNetwork and ProxyContainers

The ProxyContainers would provide decentralized proxy services. The computer which running a ProxyCointainer could earn VOKEN by providing proxy service.

Will allow users to participate when the Proxy-ClientBase is relatively complete.

VOKEN Proxy ClientBase

You can start a VOKEN Proxy-ClientBase on your desktop or laptop PC now. It would provide a standard local Socks5/HTTP proxy for you, which is based on vnTUNNEL (encrypted).

Download

VOKEN Proxy App for windows v0.11.4

If you do not have the Java JDK installed on your computer, choose one of the following to download:

Java JDK 8 Update 271 (for Windows 64 bit), choose one below:
Java JDK 8 Update 271 (for Windows 32 bit)

Install

  1. Make sure you have the Java JDK installed

  2. Extract the voken-proxy-0.11.4.7z to a new folder, or run voken-proxy-0.11.4.exe to install

Launch and initialize

Just run the VOKEN Proxy.exe, and follow the prompts to initialize.

initialize0.png initialize1.png

Proxies

Select a proxy and connect

proxies.png

Click the Proxies, choose a ProxyContainer to connect.

and a HTTP proxy http://127.0.0.1:5679 are ready for you. And also, you can check your balance, or make transactions there.

Setting: System Proxy

system_proxy.png

By setting the system proxy to ON, most of your applications (include your browsers) could use the proxy automatically.

Settings: Proxy type

only_pac.png

The default proxy type is GLOBAL, if you want to enable the PAC Mode, just click Only PAC or Except PAC.

PAC configuration file: ./resources/app/backend/pac.xml, for advanced, you can edit it manually.

VokenTB Main Contract

The MAIN CONTRACT of VokenTB.

logo_etherscan_verified logo_github logo_verified

View on Etherscan.io:

VokenTB Early-Bird Sale Contract

logo_etherscan_verified logo_github logo_verified

Ether USD Price Contracts

Get realtime price of ETH in USD (DAI, USDT), from UniSwap.

logo_etherscan_verified logo_github logo_verified

ETH USD Price (DAI)

ETH USD Price (USDT)

VOKEN Audit Data Contracts

Voken1/2 audit data contracts, as databases, for Upgrade Program.

logo_etherscan_verified logo_github logo_verified

Voken1 Audit Data

Voken2 Audit Data

Resale/Upgrade Contract

logo_etherscan_verified logo_github logo_verified

npm: @voken/base32

Compute Voken flavored Base32 encoding/decoding, with auto checksum.

@voken/base32 is human-friendly – you don’t have to worry about letters/numbers that are easy to confuse, making it easier to transmit in handwriting or typing over the phone.

The encoding alphabet consists of the numerals 0-9 and the letters a-z, excluding a few letters that might look like numbers, which we simply interpret as follows:

  • i, l -> 1

  • o -> 0

  • z -> 2

const ALPHABET = '0123456789abcdefghjkmnpqrstuvwxy'

Each character corresponds to 5 bits of input.

Lexicographic order of strings is preserved through Base 32 encoding.

Install

npm i --save @voken/base32

for yarn:

yarn add @voken/base32

API

encode(input)

input must be a Buffer or an Array. Returns a String.

const base32 = require('@voken/base32')

const bytes = Buffer.from('This is a example.')
const decoded = base32.encode(bytes)
console.log(decoded)
// => AhM6jvS0d5Sj0R90CNV62UbGDHjJV

decode(input)

input must be a Base32 encoded String. Returns a Buffer.

const base32 = require('@voken/base32')

const encoded = 'AhM6jvS0d5Sj0R90CNV62UbGDHjJV'
const bytes = base32.decode(encoded)
console.log(bytes.toString())
// => This is a example.

Hack / Test

Uses JavaScript standard style. Read more:

js-standard-style

Credits

License

MIT

npm: @voken/address

Covert a public key to Voken wallet address. Or verify an address.

Install

npm i --save @voken/address

for yarn:

yarn add @voken/address

API

fromPublicKey(input)

input must be a Buffer. Returns a String.

const vokenAddress = require('@voken/address')

const bytes = Buffer.from('02038de5ca300de53a6bc109c7178d4cb4d0cb626ff824c03872c64291fd04d8fa', 'hex')
const address = vokenAddress.fromPublicKey(bytes)
console.log(address)
// => vbnjAa398KKqj6YJ174EMCAWn1ku3tnF5

isAddress(input)

input must be a String. Returns true if input is a valid Voken wallet address.

const vokenAddress = require('@voken/address')

console.log(vokenAddress.isAddress('vMN296Q5B54j49n8Wdq4RYrsEhYm9aNDx'))
// => true
console.log(vokenAddress.isAddress('v74NJWe7hjs5H3n87K4A97tK8NkPXya6T'))
// => true
console.log(vokenAddress.isAddress('vJK2QHmmpaNU3BvP4D5K4cKm5Gf8E2Jjk'))
// => true

console.log(vokenAddress.isAddress('v6U27674GH4Qb3Cav29PYbYW16f0HeT090'))
// => false
console.log(vokenAddress.isAddress('v6U27674GH4Qb3Cav29PYbYW16f0HeT0'))
// => false
console.log(vokenAddress.isAddress('i6U27674GH4Qb3Cav29PYbYW16f0HeT09'))
// => false
console.log(vokenAddress.isAddress('v6U27674GH4Qb3Cav29PYbYW16f0Het09'))
// => false

Hack / Test

Uses JavaScript standard style. Read more:

js-standard-style

Credits

License

MIT

npm: @voken/hd-wallet

Voken HD Wallet(s), derive from a seed.

Voken was listed in SLIP-0044, with 678 as the index value.

Its rootPath of BIP44 is m/44'/678'/0'/0/....

Install

npm i --save @voken/hd-wallet

for yarn:

yarn add @voken/hd-wallet

API

new Wallet(seed)

Create a rootWallet.

seed must be a Buffer. Returns an instance of Wallet.

const Buffer = require('safe-buffer').Buffer
const Wallet = require('@voken/hd-wallet')

const seed = '81050accd71d774a23dfdc90d0e8a817805bee4fc0cb073e24cfd17c186a930dd62d8a588416e98aa046e982eedc6e4382c9ee68e6d78ff2c346b4f8efc7fbfa'
const rootWallet = new Wallet(Buffer.from(seed, 'hex'))

wallet = rootWallet.derive(i)

Derive a wallet from the rootWallet.

i should be a number (integer). Returns an object like:

const wallet = rootWallet.derive(0)
console.log(wallet)
// => {
//   index: 0,
//   path: "m/44'/678'/0'/0/0",
//   hdKey: HDKey {
//     versions: { private: 76066276, public: 76067358 },
//     depth: 5,
//     index: 0,
//     _privateKey: <Buffer d9 14 f8 d8 c8 d3 03 53 7f 01 51 bf c2 50 c4 82 ed 3f 16 d2 bd 9f c6 6c 34 90 75 06 6c 91 ea 89>,
//     _publicKey: <Buffer 03 ef c7 fd 29 0d 4c bc 28 47 70 c7 ab 00 91 07 1a 10 73 ed 3b f8 55 74 20 23 9f 7c 70 e1 09 47 2d>,
//     chainCode: <Buffer df d9 df 20 57 8a e6 e6 da 42 1d 86 da 23 f5 83 5b 3c 25 66 da aa 5c 8b 50 09 7b ee 12 8f ea a9>,
//     _fingerprint: 77754819,
//     parentFingerprint: 3846648710,
//     _identifier: <Buffer 04 a2 71 c3 79 2b 83 dc d6 b0 d8 ef 15 78 00 a5 3e d2 8d d6>
//   },
//   address: 'vJfNbKgC0GYaAY2n6k8f6qDXFDDDUj8K7'
// }

Show the privateKey/publicKey/address:

console.log(wallet.hdKey.privateKey.toString('hex'))
// d914f8d8c8d303537f0151bfc250c482ed3f16d2bd9fc66c349075066c91ea89

console.log(wallet.hdKey.publicKey.toString('hex'))
// 03efc7fd290d4cbc284770c7ab0091071a1073ed3bf8557420239f7c70e109472d

console.log(wallet.address)
// vJfNbKgC0GYaAY2n6k8f6qDXFDDDUj8K7

Example

const Buffer = require('safe-buffer').Buffer
const Wallet = require('@voken/hd-wallet')

const seed = '81050accd71d774a23dfdc90d0e8a817805bee4fc0cb073e24cfd17c186a930dd62d8a588416e98aa046e982eedc6e4382c9ee68e6d78ff2c346b4f8efc7fbfa'

console.log('seed:', seed)
// =>
// seed: 81050accd71d774a23dfdc90d0e8a817805bee4fc0cb073e24cfd17c186a930dd62d8a588416e98aa046e982eedc6e4382c9ee68e6d78ff2c346b4f8efc7fbfa

const rootWallet = new Wallet(Buffer.from(seed, 'hex'))

for (let i = 0; i < 3; i++) {
  const wallet = rootWallet.derive(i)
  console.log('wallet #' + i + ':', wallet)
}
// =>
// wallet #0: {
//   index: 0,
//   path: "m/44'/678'/0'/0/0",
//   hdKey: HDKey {
//     versions: { private: 76066276, public: 76067358 },
//     depth: 5,
//     index: 0,
//     _privateKey: <Buffer d9 14 f8 d8 c8 d3 03 53 7f 01 51 bf c2 50 c4 82 ed 3f 16 d2 bd 9f c6 6c 34 90 75 06 6c 91 ea 89>,
//     _publicKey: <Buffer 03 ef c7 fd 29 0d 4c bc 28 47 70 c7 ab 00 91 07 1a 10 73 ed 3b f8 55 74 20 23 9f 7c 70 e1 09 47 2d>,
//     chainCode: <Buffer df d9 df 20 57 8a e6 e6 da 42 1d 86 da 23 f5 83 5b 3c 25 66 da aa 5c 8b 50 09 7b ee 12 8f ea a9>,
//     _fingerprint: 77754819,
//     parentFingerprint: 3846648710,
//     _identifier: <Buffer 04 a2 71 c3 79 2b 83 dc d6 b0 d8 ef 15 78 00 a5 3e d2 8d d6>
//   },
//   address: 'vJfNbKgC0GYaAY2n6k8f6qDXFDDDUj8K7'
// }
// wallet #1: {
//   index: 1,
//   path: "m/44'/678'/0'/0/1",
//   hdKey: HDKey {
//     versions: { private: 76066276, public: 76067358 },
//     depth: 5,
//     index: 1,
//     _privateKey: <Buffer ea 44 3e 92 68 00 c3 d4 84 6f 33 fb 67 27 c1 c5 b5 eb 76 63 8a 05 e3 58 e2 a6 1f 62 c2 14 3e 2e>,
//     _publicKey: <Buffer 03 3c b8 6e c5 b4 06 ab e3 79 f2 9e fb b6 bf c4 36 b6 51 4d 37 2a 57 d8 4a 51 e7 79 0c f8 5b 2f 79>,
//     chainCode: <Buffer f8 48 9c b6 e2 ee 7e 88 6b a3 d5 25 3b 7b 87 ac 9a aa de dc 0f 2a 10 bf 50 72 b0 3d 6f 07 2d 2c>,
//     _fingerprint: 4203181884,
//     parentFingerprint: 3846648710,
//     _identifier: <Buffer fa 87 77 3c c4 67 8e 70 f8 82 27 ce 52 ef 5c 7c e1 36 c6 c2>
//   },
//   address: 'vyus4BtEjYxAbHnf3Axf63f8karJ3yDBN'
// }
// wallet #2: {
//   index: 2,
//   path: "m/44'/678'/0'/0/2",
//   hdKey: HDKey {
//     versions: { private: 76066276, public: 76067358 },
//     depth: 5,
//     index: 2,
//     _privateKey: <Buffer 7c d8 86 ec 15 b9 30 bd ae 62 d8 f9 d0 34 29 eb aa 2d 32 6a de a1 b1 43 ff 61 f8 f0 f8 ba 3b a0>,
//     _publicKey: <Buffer 03 b0 b5 07 0b 5c b6 c0 d2 64 d4 8d a2 10 87 9d 2f 93 9d 4c 9b 1e ac 02 ec 70 49 90 54 93 0f a8 54>,
//     chainCode: <Buffer a1 66 f1 75 ee ad fa c4 88 74 89 2d cc 5f af 7f bb cc 4f 8b a4 cb d1 a0 5a 77 c7 4b d9 b5 ce 37>,
//     _fingerprint: 2587414303,
//     parentFingerprint: 3846648710,
//     _identifier: <Buffer 9a 38 cf 1f 74 7c 13 cb 4f e8 36 47 b1 a0 bd 3c c0 94 cd 32>
//   },
//   address: 'v8X89pj8BXyaYaKd3Xx6BpFwrbw8d2D8F'
// }

License

MIT

npm: @voken/avatar

Create a .svg avatar from seed

Install

npm i --save @voken/avatar

for yarn:

yarn add @voken/avatar

API

svgFromSeed(seed)

Returns a xml

svgDataUriFromSeed(seed)

Returns a dataUri

License

MIT

Document revision

Note

The pages after this would be revised later.

Pricing logic and early opportunities of VOKEN

Note

The content of this page is subject to re-editing.

The first crypto-currency with clear usage value

The vast majority of blockchain networks are just a set of accounting systems. Those crypto-currencies do not rely on any anchoring or credit to issue, and their price support comes from the holder’s beliefs.

But VOKEN is quite different.

What is VOKEN?

VOKEN is the unique token in the Vision Network ecosystem, which uses Proof of Traffic consensus mechanism. It is the native asset on the vnCHAIN.

1 VokenTB = 1000 GB general traffic

VOKEN is the first crypto-currency with clear usage value.

In the underlying code, 1 Voken was defined as the client traffic of 1,000 GBytes, that is: 1 VokenTB = 1,000 GB general traffic.

How much does 1000 GB traffic cost?

Including the traffic, the price of all types of network resources can be clearly checked by major IDC service providers, which are clearly priced.

The price of resource in an IDC

The price of resource in an IDC

For 1000 GB network traffic, there is a price reference for mature IDC, with Amazon Web Services AWS, for example, priced at about $85 per 100GB traffic and Google Cloud Platform GCP at about $80.

Accelerating traffic is more expensive, while ordinary traffic is cheaper.

AWS Amazon Web Services:
GCP Google Cloud Platform:

3 basic principles of the Vision Network

There are 3 basic principles in the Vision Network ecosystem:

  1. Freedom, equality, openness, sharing, is the basic gene of the Internet, communication security and privacy protection are the basic rights of users.

  2. Service generates real value.

  3. The user pays, and the service provider charges,
    IT IS THE NATURAL TRADING SCENARIO.

They are the foundation of the project, the law of value that is non-human resistant, also our belief: If these three principles are established, the value of the entire project will be established, for sure, no doubt it.


Join us, join the revolution.

About Internet in China mainland

Click 关于中国的互联网 to read.

Chinese Edition provided only

About China’s Internet censorship, there are different opinions. Regarding the maintenance of the neutrality of the Internet, we do not publish any political opinions. We only quote a paragraph of racaljk (he also shows to some extent our point of view).

The information in this paragraph is only for China. Only mainland residents have a reading significance, so no longer provide English materials, please understand.

– Michael

BASIC PRINCIPLES

  1. Freedom, equality, openness, sharing, is the basic gene of the Internet, communication security and privacy protection are the basic rights of users.

  2. Service generates real value.

  3. The user pays, and the service provider charges,
    IT IS THE NATURAL TRADING SCENARIO.

Chatting group

Rules in chatting group

  1. No political topics

  2. No pornography, drugs, gambling topics

  3. Pay more attention to technology, applications, services, and value

  4. No personal attacks

  5. Thinking and experience sharing are welcome


shape_the_future.png

Note

As the development work progressed, we optimized the technical architecture and many details.

The whitepaper is subject to re-editing soon.

Background

  • Access restrictions in different regions of the Internet

  • Traditional centralized CDN services have great optimization potential for cost and efficiency

  • Distributed network technology matures

  • In recent years, the blockchain and cryptocurrency technology have made rapid development

  • Users can participate in blockchain network collaboration even if they are not tech-savvy

Keywords

  • Distributed Network

  • Infrastructure

  • Communication Protocol

  • Freedom of Communication

  • Proxy

  • CDN

  • Idle Bandwidth Mining

  • Privacy Protection

  • Security

Abbreviations

In the Vision Network system, include websites, documents, and various articles:

Summary

We are reconstructing the transport layer of the Internet, we are re-defining the Internet. Each user and each terminal is no longer just the bottom layer of the food chain, but should be the provider and co-builder of the Internet and services.

The Vision Network is a set of infrastructure for building a decentralized Internet. It is a distributed extensible virtual network, based on the physical network layer and the ISP network layer.

Vision Network uses blockchain technology, distributed networks and asymmetric encryption, provides distributed services such as Auto-Proxy, multi-layer anonymous network, IM, non-polluted DNS, even CDN and DDoS defense, etc.

The VOKEN – Unique token in the Vision Network ecosystem with stable value scale will be used in the entire ecology and produce an incentive effect. Everyone can participate in distributed network construction. We believe the Vision Network will make the future Internet more open, more equal, more stable, more efficient, safer and freer.

Our Philosophy: Yearning for freedom

Freedom, equality, openness, sharing are not just personal values and ideological preferences. These things are written in the basic protocols of the Internet and are the inevitable results of the design of early talents. A network can be as big as it is today, and there is no central government, no parliament and political bureau, not ideological and administrative relations at work, but a series of basic communication protocols.

An e-mail which is came from Microsoft 1 can be sent to Gmail 2, because there are many intermediate servers that carry the delivery task. This delivery is neither a business task nor an administrative task. It does not bring direct commercial benefits. There is any administrative affiliation. The existence of this open network, just because if you want to participate in this game, you must accept these open game rules.

The giants on the Internet, such as Google 3 and Facebook 4, are not the beneficiaries of the open architecture of the Internet. Whether it is from Pratt & Whitney, or from the perspective of providing more business opportunities, the open and free Internet spirit will really benefit us.

Perhaps not everyone agrees with these viewpoints. In some areas, for some reasons, ISP services are more like a large local area network. They are not as interconnected and open-minded as the original design of the Internet. As a group of technology geeks, although we can understand it, but we are more and more looking forward to enjoying an Internet infrastructure that is exactly the same as the original design, free, open, equal, and shared.

icons.png

Same like you, our team members also need accessibility, stable and fluent network communication services, explore the world through Google 3 and Wikipedia 5, share our work and life times with friends all over the world on Facebook 4 / Instagram 6, Using YouTube YouTube 7 / Twitter 8 to see a colorful world, you and us, can not only understand the latest technological trends, academic research, cutting-edge information, but also freely communicate, discuss and collaborate.

The Internet belongs to all those who construct and use it. The future of the Internet should not be abducted and controlled by any centralized organization. The billions of people who use and participate in the Internet, and the experts who construct and maintain the Internet, they all should have the rights of freely browsing and speaking.

We are taking some actions to create a distributed, borderless, and accessible future network infrastructure through a series of technologies and standards to provide the basis for user mutual assistance services, including not only the most basic interconnection services, but also expect to build secure and shareable computing, storage and other services through either mature or innovative technology methods.

Of course, all of this, starting from barrier-free interconnection, expects your blessings and support, and welcomes the participation of all people with ideals to build a healthy basic ecological environment.


1

Microsoft https://www.microsoft.com/

2

Gmail https://www.gmail.com/

3(1,2)

Google https://www.google.com/

4(1,2)

Facebook https://www.facebook.com/

5

Wikipedia https://www.wikipedia.com/

6

Instagram https://www.instagram.com/

7

YouTube https://www.youtube.com/

8

Twitter https://twitter.com/

Design concept and design principle

Keep gimmick innovation away

Although the fresh definition is indeed easier to catch the eyeballs, but that is not what we want. Innovation-driven development is a complex system engineering. In the Vision Network system solutions and ecosystem, we advocate and encourage innovation that can solve practical problems, improve efficiency, reduce costs, and solve problems.

Mature and secure technical solutions will have a higher priority

In the field of distributed node-to-node networks, encryption and privacy protection and blockchain technology, many predecessors have already completed a lot of meaningful work, some of which have matured technical solutions that have been actually verified and stable in production environment.

For example, the DHT technology, represented by S/Kademlia DHT, has completed many generations of updates, the intranet penetration and node discovery and online / offline updating, the reverse proxy technology, and the distributed file sharing system represented by BitTorrent, the directed acyclic graph DAG, the Merkle tree, the asymmetric encryption and decryption technology represented by RSA / ElGamal / ECC, the virtual private network and proxy technology represented by OpenVPN and Shadowsocks(r), the secure transmission technology represented by SSL/TLS and IPsec, blockchain data structure and so on, these are very precious experience and resources.

With practical as the main purpose, technology should serve industry, concrete application in specific scenes

The Vision Network will prioritize mature and stable technology solutions, appropriate integration and innovation, provide services for practical and concrete applications, and cost-effectively solve specific problems in specific real-life scenes.

Do not pursue the Token price increase

Unrestrained valuation expansion is not the original intention of VOKEN – Unique token in the Vision Network ecosystem. From the point of view of ecological currency, the value scale is stable, the low cost is convenient to hold, the convenience of circulation and the convenience of payment have more practical significance.

Application description and economic model

Note

The content of this page is subject to re-editing.

A Distributed Extensible Virtual Network

layers.png

The existing infrastructures in the world is physically connected. While ISPs (Internet Service Providers) provide users with network access services, they can centralize blockades and block your access. The Vision Network uses distributed peer-to-peer network technology to build a distributed, intelligent virtual network on the physical layer and ISP network layer through a large number of nodes, which can surely connect the whole world.

The Vision Network provides distributed services such as Auto-Proxy, multi-layer anonymous network, IM, non-polluted DNS, even CDN and DDoS defense, etc. The VOKEN – Unique token in the Vision Network ecosystem with stable value scale will be used in the ecology and produce an incentive effect. Everyone can participate in distributed network construction. We believe the Vision Network, a distributed Internet infrastructure will make the Internet more open, more equal, more stable, more efficient, safer and freer.

1 Voken = 1,000 GB client network traffic (price at IDC is $8.0 - 8.5)

The user running the service node makes use of idle network resources to earn Vokens, and the user or organization that needs the service uses Vokens exchange to settle through the vnCHAIN blockchain.

Turn user’s idle network resources into cash

The vast majority of home broadband networks use less than 3% of the full-year network, a large number of network resources are idle. These idle resource fragments can be combined through technical means and can generate huge value.

With the help of Vision Network, users participating in the ecology can easily run VISION node programs on computers, routers, TV boxes, and even mobile devices, even if they do not have the professional technical ability to share idle network resources. The longer the time is online, the more Vokens can be obtained, which can be used to exchange the services you need in the ecology, or sell them on the exchange to turn your idle network resources into cash.

VPN, Virtual Private Network

Virtual Private Network, abbreviated as VPN, is commonly used to connect private networks between large and medium-sized enterprises or groups. It is a kind of way that can use open network (usually Internet) to transmit network information of intranet. VPN uses cryptographic tunneling protocol to realize accurate and secure transmission of information.

In some regional networks where access is selectively restricted or blocked, because classic proxy services (such as HTTP proxy or Socks5 proxy, tec.) have been nearly impossible to use, VPN technology has almost become the preferred choice for cross the network blockages.

Using VPN to cross the network blockades – obvious rigid demands

Just in China, several tens of millions of users with rigid demands have not been satisfied. They need services like Google, Wikipedia, Facebook, Twitter, and access to professional websites in many fields. They are mainly:

  • Scientists and scholars

  • Companies engaged in scientific research

  • International trade practitioners

  • Foreigner in China, for working, studying or traveling.

  • Design Company, Film Company, Designer

  • Foreign-funded enterprise employees (mainly mobile office needs)

  • Overseas game users

  • Crypto-currency investors / holders / developers

  • Others

The network environment in China mainland is quite typical, the demand is concentrated and universal. Actually, not only in China mainland, but also in many parts of the world. For example, North America, Europe, and North Asia, there are also restrictions or speed limits or blockings.

Current situation and problems of traditional VPN

At present, the main way for users to go through the network blockade is to buy the VPN services provided by commercial software on a monthly basis, and very few users with technical ability may build their own servers.

These companies and software services are affected by various factors, such as clear organization, limited server IP concentration, and unstable service due to the upgrading of the blockade technology, business policies, ethics, speed limit or even close the company, and so on is not uncommon.

vnVPN

A decentralized distributed VPN service with unlimited nodes can cross the blockade, and avoid DNS pollution. Rigid demand, huge base, clear technical path.

The business logic of matching supply and demand is similar to shared economy models such as Ube. The technical advantage is that there is no need to set up a centralized intermediary organization, vnVPN create a decentralized platform based on blockchain and code rule. The contract is settled automatically, the node inside the wall pays the VOKEN – Unique token in the Vision Network ecosystem as the demand side, and the outside node uses the idle bandwidth as the service party to provide the encrypted traffic-proxy service and automatically accept the VOKEN – Unique token in the Vision Network ecosystem settlement, and use the PoT consensus based on the traffic. Online service, blockchain settlement.

What can vnVPN helps you?

Cross the network blockade

Without restriction, you can access any content. No matter where you are, vnVPN can always help you connect to anywhere of the Internet easily.

Use wireless networks anywhere safely

The widely used wireless hotspots not only bring convenience to users, but also bury the security problems. People who use the same network can easily eavesdrop on unprotected communications.

If you are in a bank, airport, hotel, restaurant, coffee shop, hospital, shopping mall, or any other public network, using vnVPN will allow all your communications to use secure encrypted tunnels and avoid being hacked.

One-touch connection

The vnVPN interface is concise and clean, with one-click connection and easy to use, it does not require complex configuration and can be kept running in the background.

Smart routing

Smart offload mode can automatically determine whether the access is smooth. Only when the communication is blocked, the vnVPN network proxy is activated to save the traffic cost.

Advantages of the vnVPN

vnVPN

Traditional VPN

Non VPN

Cross the network blockade

Yes

Yes

No

Privacy protection

Yes

Part

No

Never breakdown

Yes

No

/

Payment methods

By traffic

Monthly/yearly

/

Speed limit

Fast

Relatively fast

/

Price level

Cheap

Expensive

/

Number of nodes

Unlimited

Limited

/

Users can participate

Yes

No

/

Traffic is permanently valid

Yes

No

/

  • Traversing regional technology blockages using global user dynamic IP communications

  • Built-in vnDNS service to eliminate centralized DNS pollution

  • User privacy protection mechanism

  • Infinite node

  • Zero management of service nodes, turn user’s idle network resources into cash

  • Zero configuration of demand node, automatic update, smart proxy routing with vnPAC

  • Traffic is permanently valid with no limit

CDN, Content Distribution Network

CDN is the content distribution network. By setting up node servers everywhere in the network, users can get the required content near the them, make the content more quickly and more stable, solve the situation of Internet network congestion, and improve the speed of communications to the web site.

Cost and efficiency demands of CDN service

Traditional centralized CDN services rely on IDC or cloud service providers. The number of nodes is limited, the servers and bandwidth resources are expensive. The website has to pay too much for it, however the efficiency and the user experience are also limited.

vnCDN

A decentralized distributed content of the accelerated distribution services, with unlimited nodes, it will be faster, has better prices and transparent measurement.

The traditional centralized CDN service has great potential in optimizing efficiency and cost. Due to the limitation of IDC and cloud service providers, not only the number of nodes is limited, but also the traffic is expensive. Its central main operation is also often accused of data fraud and fuzzy accounting opaque.

The vnCDN combines blockchain technology, distributed network and traditional CDN technology to share a huge user base with vnVPN, truly global infinite nodes, and more users can easily access computers, routers, TV boxes, mobile devices, or even just a RaspberryPI device running VISION node programs, taking advantage of the unlimited traffic and cost advantages of home bandwidth, sharing their idle bandwidth and storage, generating revenue, making Internet acceleration nodes ubiquitous. It also provides more affordable, faster, more nodes and transparent, metrological distributed CDN services for website owners who need to accelerate.

Advantages of the vnCDN

vnCDN

Traditional CDN

Direct to host

Number of nodes

Unlimited

Dozens

Only one

Speed limit

Fast

Relatively fast

Normal

Efficiency

High

Relatively high

Normal

Price level

Cheap

Expensive

Normal

Users can participate

Yes

No

/

Open SDK

Yes

No

/

  • Efficiency and user experience increased by more than 10 times

  • Sharing a huge user base with vnVPN, truly global infinite nodes

  • Allow users to use idle resources to participate in caching and distribution, and to obtain the traffic mining benefits of the PoT consensus mechanism

  • Family VS. IDC,cost advantage of killer level

  • Provide SDK to the admin management of the website, based on blockchain, the data is true and transparent, there is no possibility of fraud

DDoS Attack

Distributed Denial-of-Service Attack, abbreviated as DDoS attack or DDoS, also called flood attack, is a network attack method in which a hacker uses a plurality of hacked computers to forge a large number of normal requests. The target is to exhaust computer’s network or the system resources, temporarily interrupting or stopping the service, causing its normal users to lose connections.

DDoS Defense

Through hacker intrusion detection, multi-authentication and filtering of traffic is designed to filter traffic that blocks network bandwidth and allow normal access traffic to pass through, protecting the target computer, website or service.

The situation and problems of traditional DDoS Defense

DDoS Defense is one of the major cost for services such as websites and APPs.

Because of intermittent demand, self-built protective server resources are too expensive to afford, so generally purchasing professional services is the only choice. The service provider provides traffic cleaning and protection services by setting up Access Gateway. The service provider is not much, Monopoly Competition Market.

Generally speaking, it consists of a monthly service fee and a resource consumption cost. Even if it is an entry-level service, it will cost about a few thousand dollars per month. This is simply the basic cost regardless of whether or not there is an attack, and the cost of resource consumption once the attack occurs is much more expensive.

vnDDoS Defense

vnDDoS takes full advantage of large number of distributed nodes and low cost by using idle bandwidth to provide hybrid DDoS defense solutions and services.

More nodes, lower prices, traffic-based payments, and reliable services.

The advantage of vnDDoS security system

vnDDoS Defense

Traditional DDoS Defense

Pay for used

Yes

Part

monthly fee

None

Expensive

Nodes

Unlimited

Hundreds

Price level

Lower

Much higher

Users participation

Yes

No

SDK support

Yes

No

Proof of Traffic

Compared with the workload of Proof of Work, it is proved that the accounting method of PoW does not require equipment competition or power consumption, but writes the ratio of VOKEN – Unique token in the Vision Network ecosystem to network traffic flow resource service as a constant definition in the underlying code.

VOKEN – Unique token in the Vision Network ecosystem

Voken is the unique token in the Vision Network ecosystem, which uses Proof of Traffic consensus mechanism. It is the native asset on the vnCHAIN.

At the beginning of the project, VOKEN – Unique token in the Vision Network ecosystem will be strictly based on the ERC20 token standard, it is created on the Ethereum network. After the vnCHAIN main network is officially installed and stabilized, the image will be migrated through signature verification.

1 Voken = 1,000 GB client traffic flow

In the underlying code, we defined per unit of Voken as the client traffic of 1,000 GBytes in the Vision Network, that is: 1 Voken = 1,000 GB client traffic flow.

PoT vs. PoW

Proof of Traffic

Proof of work

Hardware requirements

Low

Higher and higher

Power consumption

Very economical

Extremely wasteful

Equipment competition and power waste are recognized by the PoW consensus mechanism as the two major persistent diseases.

From the beginning of CPU mining, going through GPUs, FPGAs, and so on, generation after generation of ASIC chip mining machines that were createdfor the mining priced thousands of dollars, these constantly updating equipment, in addition to the internal friction of the accounting rights, and there is no other value for humanity.

The consumption of electricity is even more fearless. According to DigiConomist, 2017, bitcoin mining consumes 30 billion kilowatts of electricity, accounts for 0.13% of global electricity consumption, exceeds the national electricity consumption of dozens of countries, and showing a rising trend year by year.

rpi3bp.jpg

The Vision Network pioneered the definition of the Proof of Traffic consensus mechanism, the VISION node has only a very low performance requirement for the device, rather than a more meaningful power race. A Raspberry Pi (see attached, only consumes 1 degree of electric power per week) which priced $35, is enough to meet the hardware requirements of a node, and higher computing performance will not bring about a linear increase in revenue.

In the age of the Internet, bandwidth and traffic are clearly valued and easily measurable resources. Quantifying the traffic services provided by nodes as universal equivalents that are more currency means not only a solid value base but also Voken’s dollar price is more stable, and can effectively avoid the news pricing, PR pricing, emotional pricing. And on the other way, it effectively avoids unrestrained price speculation at the same time.

Raspberry Pi:

The price of resource in an IDC

For 1,000 GB network traffic, there is a price reference for mature IDC, with Amazon Web Services AWS, for example, priced at about $85 per 1,000 GB traffic and Google Cloud Platform GCP at about $80.

Accelerating traffic is more expensive, while ordinary traffic is cheaper.

CDN needs node storage and outlet traffic, and VPN service needs both down-link and up-link traffic to complete proxy forwarding, that is, 1,000 GB client traffic is about equal to the traffic of 2,000 GB on the service-side (1,000 GB up-link 1,000 GB down-link).

Therefore, 1,000 GB client traffic flow, anchored to 1 Voken, also coincides with the actual intrinsic use value.

AWS Amazon Web Services:
GCP Google Cloud Platform:

The Voken dollar price should increase to the internal value gradually and be relatively stable

We believe that the legal currency will not disappear in the short term, and that long-standing habits will allow more people to use the fiat currency to price products or services. At the same time, we expect that the Voken value scale after ecological maturity is relatively stable (that is, the legal currency price is relatively stable), and the basic setting of 1 Voken = 1,000 GB can ensure that the market circulation price of Voken gradually matures with the ecological value in practical use value.

Official server nodes around the world would provide initial ecological services to users

idcs.png

In the initial stage of ecological start-up, the official server nodes in 86 IDCs around the world will provide stable services to users. As time goes on, more node programs will be run by users, and the ecology will become more mature.

Technical path

Note

The content of this page is subject to re-editing.

vnP2PNET and vnNODE

Distributed peer-to-peer networks, all over the world.

vnP2PNET is the basis for the interconnection and interoperability of nodes in the entire the Vision Network.

The vnNODE user nodes all over the world run on the basis of a series of protocols and rules, which constitute the vnP2PNET distributed peer-to-peer network. These techniques are being used in several scenarios and systems such as BitTorrent, BitCoin and Ethereum and have been validated and basically mature.

P2PNET:
BitTorrent:
BitCoin:
Ethereum:

vnCHAIN, Blockchain

The design and implementation of the vnCHAIN main chain will be as simple as possible to keep the minimum requirements for computing and storage resources of the node. Storage updates, clearing, and contract execution of the latest vnPAC rules will occur on the vnCHAIN main chain, while expired data will be considered redundant and automatically backed up to other symbiotic decentralized systems (such as IPFS / EOS, etc.) for queries. And of course, nodes can also choose to save the full height of blocks (the default is to save blocks and snapshots for 255 days).

vnCHAIN uses the PoT consensus mechanism and the random accounting strategy, and there is no possibility of computing competition, which further reduces the requirements on node hardware and increases scalability.

Allow one-to-many bindings and untying of vnWallet and vnNODE

Using the logical structure of the vnWallet parallel to the vnNODE, vnWallet and vnNODE use mutually independent private and public keys, and vnWallet and vnNODE can transfer freely between themselves.

Allow one-to-many bindings and untying of vnWallet and vnNODE:

  • Allow vnWallet and vnNODE to be associated with a simultaneous signature. After the binding, the VNET Tokens for both vnNODE cost and revenue will be automatically included in the address of the corresponding vnWallet.

  • Allow vnWallet to initiate unbundling of vnNODE operations with a unilateral authorization signature. After unbinding, the cost and revenue of vnNODE are no longer associated with the past vnWallet, but only belongs to the vnNODE’s own address.

vnSDK

The vnSDK is the first end-user application built on a vnP2PNET (encapsulating the vnRPC at the same time). This development kit defines a set of standards and provides a convenient interface for the end user to take advantage of the vnCHAIN. At the same time, it gives VISION the potential to expand the scale in the future. Whether it is an official application or the participation of more partners or organizations in the application development of VISION in the future, the vnSDK will provide more convenience and will promote the entire ecosystem to be more open and colorful.

vnVPN model and principle

vnVPN.png

vnFREE non-state protocol

The exclusive algorithm vnFREE stateless protocol, based on TCP, can achieve second-level switching of service nodes without waiting for software disconnection and reconnection like traditional VPN. Military-grade AES-256 encryption, and then superimposing obfuscated packets, makes it more similar to the traffic characteristics of HTTPS and it is difficult to be detected by DPI deep packet inspection.

TCP:
AES:
HTTPS:
Deep Packet Inspection:

vnTUNNEL, Dynamic encrypted tunnel

Based on the mature OpenVPN, we add the obfuscation feature like Shadowsocks(r), and develop a kind of proprietary protocol of continuous connection, which can use both UDP and TCP mode, dynamic certificate encryption. When the bandwidth condition of service node is good, shorter delays and higher response efficiencies can be achieved.

Tunneling Protocol:
OpenVPN:
Shadowsocks:
UDP:

vnDNS, Non-pollution distributed domain name service

Although some international companies or organizations can provide clean DNS resolution services (such as IBM, Google, CloudFlare, etc.). Users still have the possibility of failing to obtain the correct resolution results, because communication packets may still be intercepted and tampered with by the ISP

Based on distributed network technology, Distributed Domain Name Service is implemented. You are protected from DNS cache pollution.

In the initial implementation of vnDNS, the node agent parsing in trusted area will be the main way to transmit the communication in the network through the dynamic encryption tunnel, and the data will be trusted. Will no longer be hijacked interception and pollution, the later development will be upgraded to a fully independent distributed DNS function of the service application

DNS:
DNS pollution:
Google Public DNS:

DDoS defense which is derived from vnDNS

The completely free distributed vnDNS resolution service can also be combined with reverse proxy technology, with the help of the huge VISION user base and the number of nodes, VISION could protect website from DDoS attacks. The website pays VOKEN – Unique token in the Vision Network ecosystem, and the participating nodes get Vokens as revenue.

Vision Network users can not only contribute to network security protection, but also increase VOKEN – Unique token in the Vision Network ecosystem revenue.

DDoS:

vnPAC Smart routing Automatic judging and updating based on ASN in ISP region

PAC, Proxy auto-config

vnVPN does not set a centralized PAC file, it will automatically identify the user’s ISP’s system number - ASN, automatically determine whether the connection is unblocked, automatically determine whether other nodes in the ASN area are unblocked, automatically update the results with the proxy rules, and perform a smart routing (only when the proxy is necessary).

Ordinary users can use the network services without any complicated manual configuration and only need to keep the vnVPN program running in the background.

PAC:
ASN:
ASN Query:

vnCDN

A brief description of vnCDN has been provided in the Application description and economic model section of the previous section. The traditional CDN technology is so mature that the benefits of universal participation, efficiency improvement, cost reduction, and service transparency brought about by the integration of blockchain and token are even more obvious.

We won’t waste too many repetitions in this article. And only attach CDN terms on Wikipedia for reference:

Tokenomics

This VOKEN Economics document outlines VOKEN pricing, supply allocation, and lockup schedules.

Use it, invest it, not hype it

This is also our blockchain technology application value philosophy.

We are building an increasingly mature system, in which VOKEN – Unique token in the Vision Network ecosystem will be the only measure of value and means of payment in such a sustainable and healthy environment. It is clear that the basic design of 1 Voken = 1,000 GB after ecological maturity will ensure that the price of Voken is not destined to deviate too much from the anchoring of its actual use value. We expect users with real demands to buy Voken and use it for appropriate network services. Of course, the value logic of Voken is so clear that proper investment maybe also a good choice.

Resource Anchored

1 VokenTB ~ 1,000 GB general traffic

Total Supply: 210 Million

This is final - total supply is not subject to change.

Deflation-oriented

The project vision network is building one of the next-generation infrastructures of the Internet. As the digital world’s blood in this globalized ecosystem, VokenTB is a necessary resource and used by more and more people.

As the ecology matures, the total supply of 210 million will become scarce.

Designed for value-driven dApps

Most of the blockchain projects we’ve seen already are only accounting. Meanwhile, the vision network really matches supply and demand in the ecosystem that providing real services, starting with proxy service.

We believe that vision network will be UNIQUE and completely different from other blockchain projects that only care about accounting.

Dynamic anchoring allowed

Briefly.

Even when there are only proxy providers/consumers in the service market.

The benefit of the scarcity design is that as the ecology matures, it becomes clear that the amount of VOKENs in circulation is not enough to meet the huge market demand and the price rises.

At this point, some service providers will raise anchoring in order to keep their prices competitive to attract more users to choose them.

We anticipate that the anchored resources will be several times more than 1,000 GB when the market reaches a dynamic equilibrium.

so…?

Transfer with burning & Trade without burning

Transfer with burning: 1.0% - 3.0%

Only on Ethereum blockchain, after fundraising and before migration to vnCHAIN main net.

Trade without burning

UniSwap (DEX) is the only recommended trading route, without burning, neither buying nor selling, anyone.

Benefits
  • Avoid the impact of CEX. No fake tokens any more.

  • Avoid the impact of malicious speculators.

  • Avoid malicious price manipulation by a few people through matched orders.

  • Avoid malicious over-price or under-price OTC trading.

  • Plentiful liquidity for buyers and sellers at DEX (everyone can join).

Distribution

Team Foundation: 10%

Locked then released in tranches to demonstrate long-term commitment.

Vested over 9 years

  • 1/60 released monthly, from 2025-01-01 to 2029-12-31 (UTC+0)

Advisors: 2%

Reserved for the vision network advisory board.

These tokens are vested over 9 years in demonstrating long-term commitment.

  • 1/84 released monthly, from 2023-01-01 to 2029-12-31 (UTC+0)

Angel Investors: 10%

These tokens are vested over 7 years in demonstrating long-term commitment.

  • 1/60 released monthly, from 2023-01-01 to 2027-12-31 (UTC+0)

Private: <10%

Upgrading from the deprecated tokens (100 GB version).

Vested with the Public-Sale (coming soon).

  • 10% released according to the process of public-sale

  • 90%/1080 released daily after Public-Sale finished

Early-Bird: 5%

Early bird has more advantages compared to the Public-Sale (coming soon). So most of the positions will be released in parallel with the users of the Public-Sale.

  • 10% released instantly

  • 90% released according the process of the Public-Sale

Public-Sale: 40%
Account Miner: 5%

Mining begins after the main network is officially launched.

  • 0.03 VokenTB per block

  • 1% reduction per 1,000,000 blocks

  • Stop rewarding if less than 0.001

Business Fund: 18%

For containers, interfaces, business partners, sales bonus, community awards, etc.

More

Note

The content of this page is subject to re-editing.

Thinking about Tor Network

After the PRISM incident, privacy protection has been increasingly focused and respected by every user who needs network security communications.

Tor, The Onion Router, is an open source, free software for anonymous communications. The project was initially sponsored by the Naval Research Laboratory. It can help users communicate and browse. Tor anonymously on the Internet through the way of Entry node, Middle node and Exit Node multi-layer proxy, which makes the user’s true source IP untraceable.

Obviously, the design of vnVPN has naturally satisfied the technical foundation for preventing tracking, anonymous browsing and communication. If VISION goes one step further and implements a multi-proxy application vnTOR, vnTOR has obvious advantages over the original Tor network. In other words, an ecosystem that uses Voken can motivate the participation of nodes (more service nodes participate, not just use and claimants), and network quality and service quality are more stable and more efficient.

2016 Movie Snowden:
// English
magnet:?xt=urn:btih:3937111709900e5d58c2c8945d9abe63365c4545&dn=Snowden.2016.1080p.WEB-DL.HEVC.x265.Ac3.6Ch-NEBO666

// Chinese
magnet:?xt=urn:btih:44bb5bbe5afcffd391dec35ec9359ae07022f2b8&dn=%E6%96%AF%E8%AF%BA%E7%99%BB.2016.%E4%B8%AD%E8%8B%B1%E5%AD%97%E5%B9%95%EF%BF%A1CMCT%E6%AD%BB%E4%BA%A1%E9%AA%91%E5%A3%AB
Edward Snowden:
PRISM:
Tor:

vnTOR, Extensible anonymous network service

Obviously, Tor has great value and reference value for the exploration and implementation of the network’s anonymity and neutrality, and we believe that the crux of the problem that currently leads to the slow and unsuitable use of the Tor network lies in the no incentives. Most of the users who participate in Tor are requesters. They are online when they use it, and they don’t keep running when they are not used. As a result, the number of service nodes is in the state of shortage of demand for a long time.

According to the actual development of the Vision Network project and opinions of the community, we may develop and implement the vnTOR multi-proxy function in the later period (the user selects the number of proxy layers and pays the corresponding Voler to drive two or more nodes to participate in the routing of data packets. The user can know the node_id of the service node on the path, and the service node is only responsible for completing the data packet routing between the adjacent nodes. The user’s source IP is invisible to both the intermediate node and the target website.) It can even be connected to Tor. The network is open, allowing users to visit the address with an .onion suffix, even you can use Hidden Wiki and the Torch search engine.

Of course, this part of the work in the future is likely to involve more implementable developers in the design and application by rewarding Vokens.

The Hidden Wiki:
Torch:
Dark net / Deep web:

Future services based on Vision Network will also be settled using Voken

Benefit from the stable value anchor design of Voken, which makes Voken closer to the true currency (value scale is stable, convenient to hold and circulate). In a sense, not only the software and services officially developed by Vision Network. With the promotion of development support policies and support funds, more third-party software will also use Voken for service settlement.

Conclusion

Vision Network takes the whole network interworking service vnVPN as the breakthrough point, the demand is rigid, the cardinality is huge, the technical path is clear, in view of the network blockade restriction question and so on, provides the systematic solution and the ecological incentive mechanism. It is easy to quickly form user and ecological advantages, which is helpful to further promote vnCDN content accelerated distribution services and more service applications. Vision Network, a distributed extensible virtual network is growing into a distributed Internet infrastructure.

The voken’s value anchoring rules, which define the clear value scale in the codes, will lead to relatively stable dollar price of the Voken. It is the unique ticket in the Vision Network ecosystem, and it is more likely to make it a cross-ecological and easy-to-use generic equivalent.

Special tips

The Vision Network team will not ask users to transfer their VOKEN – Unique token in the Vision Network ecosystem to any wallet address and non-source verified smart contract address at any time. Please pay attention to the security of assets.