Welcome to vision.network!¶
Our Philosophy: Yearning for freedom
We are reconstructing the transport layer of the Internet, we are re-defining the Internet. Each user and each terminal is no longer just the bottom layer of the food chain, but should be the provider and co-builder of the Internet and services.
The Vision Network is a set of infrastructure for building a decentralized Internet. It is a distributed extensible virtual network, based on the physical network layer and the ISP network layer.
Vision Network uses blockchain technology, distributed networks and asymmetric encryption, provides distributed services such as Auto-Proxy, multi-layer anonymous network, IM, non-polluted DNS, even CDN and DDoS defense, etc.
The VOKEN – Unique token in the Vision Network ecosystem with stable value scale will be used in the entire ecology and produce an incentive effect. Everyone can participate in distributed network construction. We believe the Vision Network will make the future Internet more open, more equal, more stable, more efficient, safer and freer.
Early-Bird Sale¶
The VokenTB Early-Bird Sale process operates by a smart contract on Ethereum blockchain, with no other privileged access given to any party.
VokenTB Early-Bird Sale Contract is open-sourced under the GNU General Public License v3.0 and can be viewed on the github repository and etherscan.io. It ensures fairness and transparency, using ETH as the only payment medium.
And you can visit the Early-Bird Sale dApp or easily just send ETH to the contract address.
Only 10.5 Million VokenTB for Early-Bird Sale (5% of the total supply)
Service Value & Usage Value ANCHORING¶
1 VokenTB = 1,000 GB general traffic, solid value base.
You can spend
1 VokenTB
to exchange1,000 GB general traffic
to use the unblocked accessible Internet, or earn VokenTB by selling/sharing your idle bandwidth.1,000 GB is worth about $80 - 85 USD in mature IDCs and cloud service platforms, such as
Only 10.5 million VokenTB for this Early-Bird Sale¶
There are only 10.5 million VokenTB would released during this Early-Bird Sale.
Running by VokenTB Early-Bird Sale Contract on the Ethereum blockchain, to make sure it is clear and free to check at anytime.
Crypto-currency ETH will be used as the only payment medium to complete the Early-bird.
Realtime ETH price¶
Using ETH as the only payment medium, Ether USD Price Contracts will always provide the realtime price of ETH which is tracking the pair on UniSwap V2.
Incremental sales price: $0.5 - $0.7¶
Starting at 1 VokenTB = $0.5 USD, until the price reaches $0.7 USD.
The latest price depends on the percentage of sales progress, and you can always find it on the Early-Bird Sale dApp’s home page. The earlier the cheaper, the later the more expensive.
Limited sales¶
We hope that more users will hold VokenTB, which is more conducive to the entire ecosystem.
Therefore, during the early bird sales phase, there is a purchase amount limit for each address:
Sales progress |
Payment limit |
---|---|
< 50% |
0.1 - 1.0 ETH |
>= 50% |
0.1 - 0.5 ETH |
Only one purchase per address is allowed.
Additional 1% - 10% bonus if you bind a referral address¶
If you have a referral address, bind it, then you can get an additional 1% - 10% random bonus (paid in VokenTB).
Vesting plan¶
Early bird has more advantages compared to the Public-Sale (coming soon). So most of the positions will be released in parallel with the users of the Public-Sale.
10% released instantly
90% released according the process of the Public-Sale
Referral reward: 22%¶
The VokenTB Early-Bird Sale Contract has a 10-levels referral system that rewards both the referrer and referee when a user reserves VokenTB tokens.
And the referral relationships will always be available, including the Public-Sale (coming soon).
During the Early-Bird Sale, 22% of sales revenue will be used as rewards:
Depth |
Reward (paid in ETH) |
Remark |
---|---|---|
0 |
10% |
|
1 |
3% |
|
2 |
2% |
|
3 |
1% |
Refer 3 or more ETH |
4 |
1% |
Refer 4 or more ETH |
5 |
1% |
Refer 5 or more ETH |
6 |
1% |
Refer 6 or more ETH |
7 |
1% |
Refer 7 or more ETH |
8 |
1% |
Refer 8 or more ETH |
9 |
1% |
Refer 9 or more ETH |
Tell your friends and help them understand the project and the opportunity. By sharing your referral address (VOKEN wallet address), your friend will get an additional 1% - 10% random bonus, and you will earn 10% ETH reward.
Paid in ETH, will transfer to your wallet address automatically and immediately, process by VokenTB Early-Bird Sale Contract.
The referral relationship chain data will be saved in the voken_tb_contract on the Ethereum blockchain, which cannot be tampered.
Anyone who join the Early-Bird Sale (include the Public-Sale (coming soon)) by using your referral address, he will get the additional random bonus, you will get rewarded.
Referrals System¶
Help improve the vision network ecosystem, strengthen the network, promote consensus, and earn ETH.
We believe that a larger user base that understands the project’s value is the foundation of a healthy ecology.
So we’ve built a multi-levels referral system that rewards both the referrer and referee when a user reserves VokenTB tokens in VokenTB sales.
And the referral relationships will always be available, including the Early-Bird Sale and the Public-Sale (coming soon).
Early-Bird referral reward: 22%¶
The VokenTB Early-Bird Sale Contract has a 10-levels referral system.
During the Early-Bird Sale, 22% of sales revenue will be used as rewards:
Depth |
Reward (paid in ETH) |
Condition |
---|---|---|
0 |
10% |
|
1 |
3% |
|
2 |
2% |
|
3 |
1% |
Refer 3 or more ETH |
4 |
1% |
Refer 4 or more ETH |
5 |
1% |
Refer 5 or more ETH |
6 |
1% |
Refer 6 or more ETH |
7 |
1% |
Refer 7 or more ETH |
8 |
1% |
Refer 8 or more ETH |
9 |
1% |
Refer 9 or more ETH |
Tell your friends and help them understand the project and the opportunity. By sharing your referral address (VOKEN wallet address), your friend will get an additional 1% - 10% random bonus, and you will earn 10% ETH reward.
Paid in ETH, will transfer to your wallet address automatically and immediately, process by VokenTB Early-Bird Sale Contract.
The referral relationship chain data will be saved in the voken_tb_contract on the Ethereum blockchain, which cannot be tampered.
Anyone who join the Early-Bird Sale (include the Public-Sale (coming soon)) by using your referral address, he will get the additional random bonus, you will get rewarded.
vnCHAIN Susitna launched (beta)¶
Susitna was launched in Aug 2020, for beta.
Contains:
Susitna AccountNetwork
Susitna ProxyNetwork
Susitna Proxy-ClientBase on Desktop OS
These repositories are already closed (without vnCHAIN):
VISION CONNECT (Alpha)
vnVPN (Alpha)
AutoSSR: FREE ShadowsocksR
Optimized shadowsocks
Note
Updating, will relaunch beta network in January 2021.
Alpha Testing VS. Beta Testing¶
Seems that many people do know alpha and beta (even never heard about?), here is a brief intro: What is the difference?
Alpha Testing¶
Alpha Testing is a type of acceptance testing; performed to identify all possible issues and bugs before releasing the final product to the end-users. Alpha testing is carried out by the testers, which are internal employees of the organization. The main goal is to identify the tasks that a typical user might perform and test them.
To put it as simple as possible, this kind of testing is called alpha only because it is done early on, near the end of the software development, and before beta testing. The main focus of alpha testing is to simulate real users using a black box and white box techniques.
Beta Testing¶
Beta Testing is performed by “real users” of the software application in a “real environment.” It can be considered a form of external User Acceptance Testing. It is the final test before shipping a product to the customers. Direct feedback from customers is a significant advantage of Beta Testing. This testing helps to test products in the customer’s environment.
Beta version of the software is released to a limited number of end-users of the product to obtain product quality feedback. Beta testing reduces product failure risks and provides increased quality of the work through customer validation.
vnCHAIN Susitna¶
(We hadn’t named the alpha stage without vnCHAIN.)
Sustina River is the 15th largest river int the United States (unfragmented), 313 miles long in South-central Alaska. The river stretches from the Susitna Glacier to Cook Inlet’s Knik Arm.
We named the beta stage Susitna after vnCHAIN had successfully networked and started to work (milestone). And it is not yet perfect. More extensive testing and feedback will help voken products mature quickly. Susitna will be the last test stage before the official release of the product. The first name of the official product will be Copper.
Note
For testing or updating purposes, the development team may restart vnCHAIN Susitna at any time, and your Susitna VOKEN balance (just beta, not real fund) may be rolled back.
Voken HD Wallet Toolkit¶
A toolkit to generate your key-pairs/addresses, validate address.
Voken HD Wallet Generator/Validator
To get some Susitna VOKEN for joining the test, just send your address to the Telegram group.
ProxyNetwork and ProxyContainers¶
The ProxyContainers would provide decentralized proxy services. The computer which running a ProxyCointainer could earn VOKEN by providing proxy service.
Will allow users to participate when the Proxy-ClientBase is relatively complete.
Proxy-ClientBase for PC¶
You can start a Proxy-ClientBase on your desktop or laptop PC now. It would provide a local Socks5 proxy for you, which is based on vnTUNNEL (encrypted).
Here is a brief_guide_for_launching_the_client_base
Voken HD Wallet Generator/Validator¶
HD Wallet Generator: https://voken1000g.github.io/toolkit/wallet/generator
HD Address Validator: https://voken1000g.github.io/toolkit/wallet/validator
BIP39 mnemonic¶
Mnemonic code for generating deterministic keys
BIP39: A group of easy to remember words – for the generation of deterministic wallets.
BIP32 HD Wallet¶
Hierarchical Deterministic Wallets
BIP32: Use the binary seed converted from a BIP39 mnemonic to generate hierarchical deterministic wallets.
BIP44 Multi-Account¶
Multi-Account Hierarchy for Deterministic Wallets
Voken was listed in SLIP-0044, with 678
as the coin_type
value.
Its rootPath
of BIP44 is m/44'/678'/0'/0/...
Read more at BIP44
Native checksum¶
A valid voken wallet address looks like: v8TX860N7Eu1jMv1yQJkb8fykXts2mVAG
It is a native checksum address. Any misspelling of even a single character will fail in address verification. This means that no Voken will be lost due to someone mistyped/pasted an wrong address.
ALPHABET for @voken/base32¶
@voken/base32 is human-friendly – you don’t have to worry about letters/numbers that are easy to confuse, making it easier to transmit in handwriting or typing over the phone.
The encoding alphabet consists of the numerals 0-9
and the letters a-z
,
excluding a few letters that might look like numbers,
which we simply interpret as follows:
i
,l
->1
o
->0
z
->2
const ALPHABET = '0123456789abcdefghjkmnpqrstuvwxy'
Each character corresponds to 5 bits of input.
Lexicographic order of strings is preserved through Base 32 encoding.
Messenger Helper¶
Messenger Helper: https://voken1000g.github.io/toolkit/messenger
Sign and encode A Message: https://voken1000g.github.io/toolkit/messenger/sign
Decode and Verify a message: https://voken1000g.github.io/toolkit/messenger/decode
ProxyNetwork and ProxyContainers¶
The ProxyContainers would provide decentralized proxy services. The computer which running a ProxyCointainer could earn VOKEN by providing proxy service.
Will allow users to participate when the Proxy-ClientBase is relatively complete.
VOKEN Proxy ClientBase¶
You can start a VOKEN Proxy-ClientBase on your desktop or laptop PC now. It would provide a standard local Socks5/HTTP proxy for you, which is based on vnTUNNEL (encrypted).
Download¶
- VOKEN Proxy App for windows v0.11.4
If you do not have the Java JDK installed on your computer, choose one of the following to download:
- Java JDK 8 Update 271 (for Windows 64 bit), choose one below:
- Java JDK 8 Update 271 (for Windows 32 bit)
Install¶
Make sure you have the Java JDK installed
Extract the voken-proxy-0.11.4.7z to a new folder, or run voken-proxy-0.11.4.exe to install
Proxies¶
Select a proxy and connect

Click the Proxies, choose a ProxyContainer to connect.
and a HTTP proxy http://127.0.0.1:5679
are ready for you.
And also, you can check your balance, or make transactions there.
Setting: System Proxy¶

By setting the system proxy to ON, most of your applications (include your browsers) could use the proxy automatically.
Settings: Proxy type¶

The default proxy type is GLOBAL
,
if you want to enable the PAC Mode
,
just click Only PAC
or Except PAC
.
PAC configuration file: ./resources/app/backend/pac.xml
, for advanced, you can edit it manually.
VokenTB Main Contract¶
The MAIN CONTRACT of VokenTB.
ENS Domain: voken.eth
Contract address is 0x1234567a022acaa848E7D6bC351d075dBfa76Dd4
Deployed at Tx Hash 0xe7de0bd78f9f575e029a44f5fff341…
Block height 11459677
Open-sourced under the GNU General Public License v3.0
View on Etherscan.io:
VokenTB Early-Bird Sale Contract¶
ENS Domain: early-bird.voken.eth
Contract address is 0x1aaaa06374970dE748130EaccCdd2d0348E834c4
Deployed at Tx Hash 0xf5581fdbbc3f2662155a496dabddc5…
Block height 11459998
Open-sourced under the GNU General Public License v3.0
Ether USD Price Contracts¶
Get realtime price of ETH in USD (DAI, USDT), from UniSwap.
ETH USD Price (DAI)¶
Contract address is 0xffff1e4d945d41B88458ce2966fA783BC01BA29B
Deployed at Tx Hash 0x846e58d0400cb248e2adfb6fc5476c…
Block height 11285301
Open-sourced under the MIT License (MIT)
ETH USD Price (USDT)¶
Contract address is 0xffff2e6fFC9A21C620253ef85Ea8f2CF67C3b496
Deployed at Tx Hash 0x022351fb9c792775235688b5ede9f9…
Block height 11285301
Open-sourced under the MIT License (MIT)
VOKEN Audit Data Contracts¶
Voken1/2 audit data contracts, as databases, for Upgrade Program.
Voken1 Audit Data¶
Contract address is 0x11111eA590876f5E8416cD4a81A0CFb9DfA2b08E
Deployed at Tx Hash 0x846e58d0400cb248e2adfb6fc5476c…
Block height 11341184
Open-sourced under the MIT License (MIT)
Voken2 Audit Data¶
Contract address is 0x22222eA5b84E877A1790b4653a70ad0df8e3E890
Deployed at Tx Hash 0x5676ad91b79c8acca7c038e119def1…
Block height 11341252
Open-sourced under the MIT License (MIT)
Resale/Upgrade Contract¶
ENS Domain: upgrade.voken.eth
Contract address is 0x00000004b941F37c39550B05c90280d11a14C88e
Deployed at Tx Hash 0x8dde30966d862d78180621e2d5960e…
Block height 11460155
Open-sourced under the GNU General Public License v3.0
npm: @voken/base32¶
Toolkit (Demo): https://voken1000g.github.io/toolkit/base32/
Compute Voken flavored Base32 encoding/decoding, with auto checksum.
@voken/base32 is human-friendly – you don’t have to worry about letters/numbers that are easy to confuse, making it easier to transmit in handwriting or typing over the phone.
The encoding alphabet consists of the numerals 0-9
and the letters a-z
,
excluding a few letters that might look like numbers,
which we simply interpret as follows:
i
,l
->1
o
->0
z
->2
const ALPHABET = '0123456789abcdefghjkmnpqrstuvwxy'
Each character corresponds to 5 bits of input.
Lexicographic order of strings is preserved through Base 32 encoding.
API¶
Credits¶
Mike Hearn for original Java implementation
Stefan Thomas for porting to JavaScript
Stephan Pair for buffer improvements
Daniel Cousens for cleanup and merging improvements from bitcoinjs-lib
Jared Deckard for killing
bigi
as a dependency
License¶
MIT
npm: @voken/address¶
Covert a public key to Voken wallet address. Or verify an address.
API¶
fromPublicKey(input)¶
input
must be a Buffer. Returns a String
.
const vokenAddress = require('@voken/address')
const bytes = Buffer.from('02038de5ca300de53a6bc109c7178d4cb4d0cb626ff824c03872c64291fd04d8fa', 'hex')
const address = vokenAddress.fromPublicKey(bytes)
console.log(address)
// => vbnjAa398KKqj6YJ174EMCAWn1ku3tnF5
isAddress(input)¶
input
must be a String
. Returns true
if input
is a valid Voken wallet address.
const vokenAddress = require('@voken/address')
console.log(vokenAddress.isAddress('vMN296Q5B54j49n8Wdq4RYrsEhYm9aNDx'))
// => true
console.log(vokenAddress.isAddress('v74NJWe7hjs5H3n87K4A97tK8NkPXya6T'))
// => true
console.log(vokenAddress.isAddress('vJK2QHmmpaNU3BvP4D5K4cKm5Gf8E2Jjk'))
// => true
console.log(vokenAddress.isAddress('v6U27674GH4Qb3Cav29PYbYW16f0HeT090'))
// => false
console.log(vokenAddress.isAddress('v6U27674GH4Qb3Cav29PYbYW16f0HeT0'))
// => false
console.log(vokenAddress.isAddress('i6U27674GH4Qb3Cav29PYbYW16f0HeT09'))
// => false
console.log(vokenAddress.isAddress('v6U27674GH4Qb3Cav29PYbYW16f0Het09'))
// => false
Credits¶
Mike Hearn for original Java implementation
Stefan Thomas for porting to JavaScript
Stephan Pair for buffer improvements
Daniel Cousens for cleanup and merging improvements from bitcoinjs-lib
Jared Deckard for killing
bigi
as a dependency
License¶
MIT
npm: @voken/hd-wallet¶
Toolkit (Demo): https://voken1000g.github.io/toolkit/wallet/generator/
Voken HD Wallet(s), derive from a seed.
Voken was listed in SLIP-0044, with 678
as the index value.
Its rootPath
of BIP44 is m/44'/678'/0'/0/...
.
API¶
new Wallet(seed)¶
Create a rootWallet
.
seed
must be a Buffer. Returns an instance of Wallet
.
const Buffer = require('safe-buffer').Buffer
const Wallet = require('@voken/hd-wallet')
const seed = '81050accd71d774a23dfdc90d0e8a817805bee4fc0cb073e24cfd17c186a930dd62d8a588416e98aa046e982eedc6e4382c9ee68e6d78ff2c346b4f8efc7fbfa'
const rootWallet = new Wallet(Buffer.from(seed, 'hex'))
wallet = rootWallet.derive(i)¶
Derive a wallet from the rootWallet
.
i
should be a number (integer). Returns an object like:
const wallet = rootWallet.derive(0)
console.log(wallet)
// => {
// index: 0,
// path: "m/44'/678'/0'/0/0",
// hdKey: HDKey {
// versions: { private: 76066276, public: 76067358 },
// depth: 5,
// index: 0,
// _privateKey: <Buffer d9 14 f8 d8 c8 d3 03 53 7f 01 51 bf c2 50 c4 82 ed 3f 16 d2 bd 9f c6 6c 34 90 75 06 6c 91 ea 89>,
// _publicKey: <Buffer 03 ef c7 fd 29 0d 4c bc 28 47 70 c7 ab 00 91 07 1a 10 73 ed 3b f8 55 74 20 23 9f 7c 70 e1 09 47 2d>,
// chainCode: <Buffer df d9 df 20 57 8a e6 e6 da 42 1d 86 da 23 f5 83 5b 3c 25 66 da aa 5c 8b 50 09 7b ee 12 8f ea a9>,
// _fingerprint: 77754819,
// parentFingerprint: 3846648710,
// _identifier: <Buffer 04 a2 71 c3 79 2b 83 dc d6 b0 d8 ef 15 78 00 a5 3e d2 8d d6>
// },
// address: 'vJfNbKgC0GYaAY2n6k8f6qDXFDDDUj8K7'
// }
Show the privateKey
/publicKey
/address
:
console.log(wallet.hdKey.privateKey.toString('hex'))
// d914f8d8c8d303537f0151bfc250c482ed3f16d2bd9fc66c349075066c91ea89
console.log(wallet.hdKey.publicKey.toString('hex'))
// 03efc7fd290d4cbc284770c7ab0091071a1073ed3bf8557420239f7c70e109472d
console.log(wallet.address)
// vJfNbKgC0GYaAY2n6k8f6qDXFDDDUj8K7
Example¶
const Buffer = require('safe-buffer').Buffer
const Wallet = require('@voken/hd-wallet')
const seed = '81050accd71d774a23dfdc90d0e8a817805bee4fc0cb073e24cfd17c186a930dd62d8a588416e98aa046e982eedc6e4382c9ee68e6d78ff2c346b4f8efc7fbfa'
console.log('seed:', seed)
// =>
// seed: 81050accd71d774a23dfdc90d0e8a817805bee4fc0cb073e24cfd17c186a930dd62d8a588416e98aa046e982eedc6e4382c9ee68e6d78ff2c346b4f8efc7fbfa
const rootWallet = new Wallet(Buffer.from(seed, 'hex'))
for (let i = 0; i < 3; i++) {
const wallet = rootWallet.derive(i)
console.log('wallet #' + i + ':', wallet)
}
// =>
// wallet #0: {
// index: 0,
// path: "m/44'/678'/0'/0/0",
// hdKey: HDKey {
// versions: { private: 76066276, public: 76067358 },
// depth: 5,
// index: 0,
// _privateKey: <Buffer d9 14 f8 d8 c8 d3 03 53 7f 01 51 bf c2 50 c4 82 ed 3f 16 d2 bd 9f c6 6c 34 90 75 06 6c 91 ea 89>,
// _publicKey: <Buffer 03 ef c7 fd 29 0d 4c bc 28 47 70 c7 ab 00 91 07 1a 10 73 ed 3b f8 55 74 20 23 9f 7c 70 e1 09 47 2d>,
// chainCode: <Buffer df d9 df 20 57 8a e6 e6 da 42 1d 86 da 23 f5 83 5b 3c 25 66 da aa 5c 8b 50 09 7b ee 12 8f ea a9>,
// _fingerprint: 77754819,
// parentFingerprint: 3846648710,
// _identifier: <Buffer 04 a2 71 c3 79 2b 83 dc d6 b0 d8 ef 15 78 00 a5 3e d2 8d d6>
// },
// address: 'vJfNbKgC0GYaAY2n6k8f6qDXFDDDUj8K7'
// }
// wallet #1: {
// index: 1,
// path: "m/44'/678'/0'/0/1",
// hdKey: HDKey {
// versions: { private: 76066276, public: 76067358 },
// depth: 5,
// index: 1,
// _privateKey: <Buffer ea 44 3e 92 68 00 c3 d4 84 6f 33 fb 67 27 c1 c5 b5 eb 76 63 8a 05 e3 58 e2 a6 1f 62 c2 14 3e 2e>,
// _publicKey: <Buffer 03 3c b8 6e c5 b4 06 ab e3 79 f2 9e fb b6 bf c4 36 b6 51 4d 37 2a 57 d8 4a 51 e7 79 0c f8 5b 2f 79>,
// chainCode: <Buffer f8 48 9c b6 e2 ee 7e 88 6b a3 d5 25 3b 7b 87 ac 9a aa de dc 0f 2a 10 bf 50 72 b0 3d 6f 07 2d 2c>,
// _fingerprint: 4203181884,
// parentFingerprint: 3846648710,
// _identifier: <Buffer fa 87 77 3c c4 67 8e 70 f8 82 27 ce 52 ef 5c 7c e1 36 c6 c2>
// },
// address: 'vyus4BtEjYxAbHnf3Axf63f8karJ3yDBN'
// }
// wallet #2: {
// index: 2,
// path: "m/44'/678'/0'/0/2",
// hdKey: HDKey {
// versions: { private: 76066276, public: 76067358 },
// depth: 5,
// index: 2,
// _privateKey: <Buffer 7c d8 86 ec 15 b9 30 bd ae 62 d8 f9 d0 34 29 eb aa 2d 32 6a de a1 b1 43 ff 61 f8 f0 f8 ba 3b a0>,
// _publicKey: <Buffer 03 b0 b5 07 0b 5c b6 c0 d2 64 d4 8d a2 10 87 9d 2f 93 9d 4c 9b 1e ac 02 ec 70 49 90 54 93 0f a8 54>,
// chainCode: <Buffer a1 66 f1 75 ee ad fa c4 88 74 89 2d cc 5f af 7f bb cc 4f 8b a4 cb d1 a0 5a 77 c7 4b d9 b5 ce 37>,
// _fingerprint: 2587414303,
// parentFingerprint: 3846648710,
// _identifier: <Buffer 9a 38 cf 1f 74 7c 13 cb 4f e8 36 47 b1 a0 bd 3c c0 94 cd 32>
// },
// address: 'v8X89pj8BXyaYaKd3Xx6BpFwrbw8d2D8F'
// }
License¶
MIT
npm: @voken/avatar¶
Toolkit (Demo): https://voken1000g.github.io/toolkit/avatar/
Create a .svg avatar from seed
License¶
MIT
npm: @voken/sha¶
npm: @voken/private-key¶
npm: @voken/public-key¶
npm: @voken/aes256ctr¶
npm: @voken/edsv¶
Document revision¶
Note
The pages after this would be revised later.
Pricing logic and early opportunities of VOKEN¶
Note
The content of this page is subject to re-editing.
The first crypto-currency with clear usage value¶
The vast majority of blockchain networks are just a set of accounting systems. Those crypto-currencies do not rely on any anchoring or credit to issue, and their price support comes from the holder’s beliefs.
But VOKEN is quite different.
What is VOKEN?¶
VOKEN is the unique token in the Vision Network ecosystem, which uses Proof of Traffic consensus mechanism. It is the native asset on the vnCHAIN.
1 VokenTB = 1000 GB general traffic¶
VOKEN is the first crypto-currency with clear usage value.
In the underlying code, 1 Voken was defined as the client traffic of 1,000 GBytes, that is: 1 VokenTB = 1,000 GB general traffic.
How much does 1000 GB traffic cost?¶
Including the traffic, the price of all types of network resources can be clearly checked by major IDC service providers, which are clearly priced.
The price of resource in an IDC¶
The price of resource in an IDC
For 1000 GB network traffic, there is a price reference for mature IDC, with Amazon Web Services AWS, for example, priced at about $85 per 100GB traffic and Google Cloud Platform GCP at about $80.
Accelerating traffic is more expensive, while ordinary traffic is cheaper.
- AWS Amazon Web Services:
- GCP Google Cloud Platform:
3 basic principles of the Vision Network¶
There are 3 basic principles in the Vision Network ecosystem:
Freedom, equality, openness, sharing, is the basic gene of the Internet, communication security and privacy protection are the basic rights of users.
Service generates real value.
- The user pays, and the service provider charges,IT IS THE NATURAL TRADING SCENARIO.
They are the foundation of the project, the law of value that is non-human resistant, also our belief: If these three principles are established, the value of the entire project will be established, for sure, no doubt it.
Join us, join the revolution.
About Internet in China mainland¶
Click 关于中国的互联网 to read.
Chinese Edition provided only¶
About China’s Internet censorship, there are different opinions. Regarding the maintenance of the neutrality of the Internet, we do not publish any political opinions. We only quote a paragraph of racaljk (he also shows to some extent our point of view).
The information in this paragraph is only for China. Only mainland residents have a reading significance, so no longer provide English materials, please understand.
– Michael
BASIC PRINCIPLES¶
Freedom, equality, openness, sharing, is the basic gene of the Internet, communication security and privacy protection are the basic rights of users.
Service generates real value.
- The user pays, and the service provider charges,IT IS THE NATURAL TRADING SCENARIO.
Contact us¶
E-mail¶
Telegram Group¶
https://t.me/vokenCN (Chinese Group)
Documentations¶
https://voken.io/zh_CN/latest/ (Simplified Chinese)

Note
As the development work progressed, we optimized the technical architecture and many details.
The whitepaper is subject to re-editing soon.
Background¶
Access restrictions in different regions of the Internet
Traditional centralized CDN services have great optimization potential for cost and efficiency
Distributed network technology matures
In recent years, the blockchain and cryptocurrency technology have made rapid development
Users can participate in blockchain network collaboration even if they are not tech-savvy
Keywords¶
Distributed Network
Infrastructure
Communication Protocol
Freedom of Communication
Proxy
CDN
Idle Bandwidth Mining
Privacy Protection
Security
Abbreviations¶
In the Vision Network system, include websites, documents, and various articles:
Uppercase
VISION
abbreviation will be used to refer to the Vision Network, the entire project.Typo
Voken
andVokens
abbreviation used to refer to VOKEN – Unique token in the Vision Network ecosystem
Summary¶
We are reconstructing the transport layer of the Internet, we are re-defining the Internet. Each user and each terminal is no longer just the bottom layer of the food chain, but should be the provider and co-builder of the Internet and services.
The Vision Network is a set of infrastructure for building a decentralized Internet. It is a distributed extensible virtual network, based on the physical network layer and the ISP network layer.
Vision Network uses blockchain technology, distributed networks and asymmetric encryption, provides distributed services such as Auto-Proxy, multi-layer anonymous network, IM, non-polluted DNS, even CDN and DDoS defense, etc.
The VOKEN – Unique token in the Vision Network ecosystem with stable value scale will be used in the entire ecology and produce an incentive effect. Everyone can participate in distributed network construction. We believe the Vision Network will make the future Internet more open, more equal, more stable, more efficient, safer and freer.
Our Philosophy: Yearning for freedom¶
Freedom, equality, openness, sharing are not just personal values and ideological preferences. These things are written in the basic protocols of the Internet and are the inevitable results of the design of early talents. A network can be as big as it is today, and there is no central government, no parliament and political bureau, not ideological and administrative relations at work, but a series of basic communication protocols.
An e-mail which is came from Microsoft 1 can be sent to Gmail 2, because there are many intermediate servers that carry the delivery task. This delivery is neither a business task nor an administrative task. It does not bring direct commercial benefits. There is any administrative affiliation. The existence of this open network, just because if you want to participate in this game, you must accept these open game rules.
The giants on the Internet, such as Google 3 and Facebook 4, are not the beneficiaries of the open architecture of the Internet. Whether it is from Pratt & Whitney, or from the perspective of providing more business opportunities, the open and free Internet spirit will really benefit us.
Perhaps not everyone agrees with these viewpoints. In some areas, for some reasons, ISP services are more like a large local area network. They are not as interconnected and open-minded as the original design of the Internet. As a group of technology geeks, although we can understand it, but we are more and more looking forward to enjoying an Internet infrastructure that is exactly the same as the original design, free, open, equal, and shared.

Same like you, our team members also need accessibility, stable and fluent network communication services, explore the world through Google 3 and Wikipedia 5, share our work and life times with friends all over the world on Facebook 4 / Instagram 6, Using YouTube YouTube 7 / Twitter 8 to see a colorful world, you and us, can not only understand the latest technological trends, academic research, cutting-edge information, but also freely communicate, discuss and collaborate.
The Internet belongs to all those who construct and use it. The future of the Internet should not be abducted and controlled by any centralized organization. The billions of people who use and participate in the Internet, and the experts who construct and maintain the Internet, they all should have the rights of freely browsing and speaking.
We are taking some actions to create a distributed, borderless, and accessible future network infrastructure through a series of technologies and standards to provide the basis for user mutual assistance services, including not only the most basic interconnection services, but also expect to build secure and shareable computing, storage and other services through either mature or innovative technology methods.
Of course, all of this, starting from barrier-free interconnection, expects your blessings and support, and welcomes the participation of all people with ideals to build a healthy basic ecological environment.
- 1
Microsoft https://www.microsoft.com/
- 2
Gmail https://www.gmail.com/
- 3(1,2)
Google https://www.google.com/
- 4(1,2)
Facebook https://www.facebook.com/
- 5
Wikipedia https://www.wikipedia.com/
- 6
Instagram https://www.instagram.com/
- 7
YouTube https://www.youtube.com/
- 8
Twitter https://twitter.com/
Design concept and design principle¶
Keep gimmick innovation away¶
Although the fresh definition is indeed easier to catch the eyeballs, but that is not what we want. Innovation-driven development is a complex system engineering. In the Vision Network system solutions and ecosystem, we advocate and encourage innovation that can solve practical problems, improve efficiency, reduce costs, and solve problems.
Mature and secure technical solutions will have a higher priority¶
In the field of distributed node-to-node networks, encryption and privacy protection and blockchain technology, many predecessors have already completed a lot of meaningful work, some of which have matured technical solutions that have been actually verified and stable in production environment.
For example, the DHT technology, represented by S/Kademlia DHT, has completed many generations of updates, the intranet penetration and node discovery and online / offline updating, the reverse proxy technology, and the distributed file sharing system represented by BitTorrent, the directed acyclic graph DAG, the Merkle tree, the asymmetric encryption and decryption technology represented by RSA / ElGamal / ECC, the virtual private network and proxy technology represented by OpenVPN and Shadowsocks(r), the secure transmission technology represented by SSL/TLS and IPsec, blockchain data structure and so on, these are very precious experience and resources.
With practical as the main purpose, technology should serve industry, concrete application in specific scenes¶
The Vision Network will prioritize mature and stable technology solutions, appropriate integration and innovation, provide services for practical and concrete applications, and cost-effectively solve specific problems in specific real-life scenes.
Do not pursue the Token price increase¶
Unrestrained valuation expansion is not the original intention of VOKEN – Unique token in the Vision Network ecosystem. From the point of view of ecological currency, the value scale is stable, the low cost is convenient to hold, the convenience of circulation and the convenience of payment have more practical significance.
Application description and economic model¶
Note
The content of this page is subject to re-editing.
A Distributed Extensible Virtual Network¶

The existing infrastructures in the world is physically connected. While ISPs (Internet Service Providers) provide users with network access services, they can centralize blockades and block your access. The Vision Network uses distributed peer-to-peer network technology to build a distributed, intelligent virtual network on the physical layer and ISP network layer through a large number of nodes, which can surely connect the whole world.
The Vision Network provides distributed services such as Auto-Proxy, multi-layer anonymous network, IM, non-polluted DNS, even CDN and DDoS defense, etc. The VOKEN – Unique token in the Vision Network ecosystem with stable value scale will be used in the ecology and produce an incentive effect. Everyone can participate in distributed network construction. We believe the Vision Network, a distributed Internet infrastructure will make the Internet more open, more equal, more stable, more efficient, safer and freer.
1 Voken = 1,000 GB client network traffic (price at IDC is $8.0 - 8.5)
The user running the service node makes use of idle network resources to earn Vokens, and the user or organization that needs the service uses Vokens exchange to settle through the vnCHAIN blockchain.
Turn user’s idle network resources into cash¶
The vast majority of home broadband networks use less than 3% of the full-year network, a large number of network resources are idle. These idle resource fragments can be combined through technical means and can generate huge value.
With the help of Vision Network, users participating in the ecology can easily run VISION node programs on computers, routers, TV boxes, and even mobile devices, even if they do not have the professional technical ability to share idle network resources. The longer the time is online, the more Vokens can be obtained, which can be used to exchange the services you need in the ecology, or sell them on the exchange to turn your idle network resources into cash.
VPN, Virtual Private Network¶
Virtual Private Network, abbreviated as VPN, is commonly used to connect private networks between large and medium-sized enterprises or groups. It is a kind of way that can use open network (usually Internet) to transmit network information of intranet. VPN uses cryptographic tunneling protocol to realize accurate and secure transmission of information.
In some regional networks where access is selectively restricted or blocked, because classic proxy services (such as HTTP proxy or Socks5 proxy, tec.) have been nearly impossible to use, VPN technology has almost become the preferred choice for cross the network blockages.
Using VPN to cross the network blockades – obvious rigid demands¶
Just in China, several tens of millions of users with rigid demands have not been satisfied. They need services like Google, Wikipedia, Facebook, Twitter, and access to professional websites in many fields. They are mainly:
Scientists and scholars
Companies engaged in scientific research
International trade practitioners
Foreigner in China, for working, studying or traveling.
Design Company, Film Company, Designer
Foreign-funded enterprise employees (mainly mobile office needs)
Overseas game users
Crypto-currency investors / holders / developers
Others
The network environment in China mainland is quite typical, the demand is concentrated and universal. Actually, not only in China mainland, but also in many parts of the world. For example, North America, Europe, and North Asia, there are also restrictions or speed limits or blockings.
Current situation and problems of traditional VPN¶
At present, the main way for users to go through the network blockade is to buy the VPN services provided by commercial software on a monthly basis, and very few users with technical ability may build their own servers.
These companies and software services are affected by various factors, such as clear organization, limited server IP concentration, and unstable service due to the upgrading of the blockade technology, business policies, ethics, speed limit or even close the company, and so on is not uncommon.
vnVPN¶
A decentralized distributed VPN service with unlimited nodes can cross the blockade, and avoid DNS pollution. Rigid demand, huge base, clear technical path.
The business logic of matching supply and demand is similar to shared economy models such as Ube. The technical advantage is that there is no need to set up a centralized intermediary organization, vnVPN create a decentralized platform based on blockchain and code rule. The contract is settled automatically, the node inside the wall pays the VOKEN – Unique token in the Vision Network ecosystem as the demand side, and the outside node uses the idle bandwidth as the service party to provide the encrypted traffic-proxy service and automatically accept the VOKEN – Unique token in the Vision Network ecosystem settlement, and use the PoT consensus based on the traffic. Online service, blockchain settlement.
What can vnVPN helps you?¶
- Cross the network blockade
Without restriction, you can access any content. No matter where you are, vnVPN can always help you connect to anywhere of the Internet easily.
- Use wireless networks anywhere safely
The widely used wireless hotspots not only bring convenience to users, but also bury the security problems. People who use the same network can easily eavesdrop on unprotected communications.
If you are in a bank, airport, hotel, restaurant, coffee shop, hospital, shopping mall, or any other public network, using vnVPN will allow all your communications to use secure encrypted tunnels and avoid being hacked.
- One-touch connection
The vnVPN interface is concise and clean, with one-click connection and easy to use, it does not require complex configuration and can be kept running in the background.
- Smart routing
Smart offload mode can automatically determine whether the access is smooth. Only when the communication is blocked, the vnVPN network proxy is activated to save the traffic cost.
Advantages of the vnVPN¶
vnVPN |
Traditional VPN |
Non VPN |
|
Cross the network blockade |
Yes |
Yes |
No |
Privacy protection |
Yes |
Part |
No |
Never breakdown |
Yes |
No |
/ |
Payment methods |
By traffic |
Monthly/yearly |
/ |
Speed limit |
Fast |
Relatively fast |
/ |
Price level |
Cheap |
Expensive |
/ |
Number of nodes |
Unlimited |
Limited |
/ |
Users can participate |
Yes |
No |
/ |
Traffic is permanently valid |
Yes |
No |
/ |
Traversing regional technology blockages using global user dynamic IP communications
Built-in vnDNS service to eliminate centralized DNS pollution
User privacy protection mechanism
Infinite node
Zero management of service nodes, turn user’s idle network resources into cash
Zero configuration of demand node, automatic update, smart proxy routing with vnPAC
Traffic is permanently valid with no limit
CDN, Content Distribution Network¶
CDN is the content distribution network. By setting up node servers everywhere in the network, users can get the required content near the them, make the content more quickly and more stable, solve the situation of Internet network congestion, and improve the speed of communications to the web site.
Cost and efficiency demands of CDN service¶
Traditional centralized CDN services rely on IDC or cloud service providers. The number of nodes is limited, the servers and bandwidth resources are expensive. The website has to pay too much for it, however the efficiency and the user experience are also limited.
vnCDN¶
A decentralized distributed content of the accelerated distribution services, with unlimited nodes, it will be faster, has better prices and transparent measurement.
The traditional centralized CDN service has great potential in optimizing efficiency and cost. Due to the limitation of IDC and cloud service providers, not only the number of nodes is limited, but also the traffic is expensive. Its central main operation is also often accused of data fraud and fuzzy accounting opaque.
The vnCDN combines blockchain technology, distributed network and traditional CDN technology to share a huge user base with vnVPN, truly global infinite nodes, and more users can easily access computers, routers, TV boxes, mobile devices, or even just a RaspberryPI device running VISION node programs, taking advantage of the unlimited traffic and cost advantages of home bandwidth, sharing their idle bandwidth and storage, generating revenue, making Internet acceleration nodes ubiquitous. It also provides more affordable, faster, more nodes and transparent, metrological distributed CDN services for website owners who need to accelerate.
Advantages of the vnCDN¶
vnCDN |
Traditional CDN |
Direct to host |
|
Number of nodes |
Unlimited |
Dozens |
Only one |
Speed limit |
Fast |
Relatively fast |
Normal |
Efficiency |
High |
Relatively high |
Normal |
Price level |
Cheap |
Expensive |
Normal |
Users can participate |
Yes |
No |
/ |
Open SDK |
Yes |
No |
/ |
Efficiency and user experience increased by more than 10 times
Sharing a huge user base with vnVPN, truly global infinite nodes
Allow users to use idle resources to participate in caching and distribution, and to obtain the traffic mining benefits of the PoT consensus mechanism
Family VS. IDC,cost advantage of killer level
Provide SDK to the admin management of the website, based on blockchain, the data is true and transparent, there is no possibility of fraud
DDoS Attack¶
Distributed Denial-of-Service Attack, abbreviated as DDoS attack or DDoS, also called flood attack, is a network attack method in which a hacker uses a plurality of hacked computers to forge a large number of normal requests. The target is to exhaust computer’s network or the system resources, temporarily interrupting or stopping the service, causing its normal users to lose connections.
DDoS Defense¶
Through hacker intrusion detection, multi-authentication and filtering of traffic is designed to filter traffic that blocks network bandwidth and allow normal access traffic to pass through, protecting the target computer, website or service.
The situation and problems of traditional DDoS Defense¶
DDoS Defense is one of the major cost for services such as websites and APPs.
Because of intermittent demand, self-built protective server resources are too expensive to afford, so generally purchasing professional services is the only choice. The service provider provides traffic cleaning and protection services by setting up Access Gateway. The service provider is not much, Monopoly Competition Market.
Generally speaking, it consists of a monthly service fee and a resource consumption cost. Even if it is an entry-level service, it will cost about a few thousand dollars per month. This is simply the basic cost regardless of whether or not there is an attack, and the cost of resource consumption once the attack occurs is much more expensive.
vnDDoS Defense¶
vnDDoS takes full advantage of large number of distributed nodes and low cost by using idle bandwidth to provide hybrid DDoS defense solutions and services.
More nodes, lower prices, traffic-based payments, and reliable services.
The advantage of vnDDoS security system¶
vnDDoS Defense |
Traditional DDoS Defense |
|
Pay for used |
Yes |
Part |
monthly fee |
None |
Expensive |
Nodes |
Unlimited |
Hundreds |
Price level |
Lower |
Much higher |
Users participation |
Yes |
No |
SDK support |
Yes |
No |
Proof of Traffic¶
Compared with the workload of Proof of Work, it is proved that the accounting method of PoW does not require equipment competition or power consumption, but writes the ratio of VOKEN – Unique token in the Vision Network ecosystem to network traffic flow resource service as a constant definition in the underlying code.
VOKEN – Unique token in the Vision Network ecosystem¶
Voken
is the unique token in the Vision Network ecosystem,
which uses Proof of Traffic consensus mechanism. It is the native asset on the vnCHAIN.
At the beginning of the project, VOKEN – Unique token in the Vision Network ecosystem will be strictly based on the ERC20 token standard, it is created on the Ethereum network. After the vnCHAIN main network is officially installed and stabilized, the image will be migrated through signature verification.
1 Voken = 1,000 GB client traffic flow¶
In the underlying code,
we defined per unit of Voken
as the client traffic of 1,000 GBytes in the Vision Network,
that is: 1 Voken = 1,000 GB client traffic flow.
PoT vs. PoW¶
Proof of Traffic |
Proof of work |
|
Hardware requirements |
Low |
Higher and higher |
Power consumption |
Very economical |
Extremely wasteful |
Equipment competition and power waste are recognized by the PoW consensus mechanism as the two major persistent diseases.
From the beginning of CPU mining, going through GPUs, FPGAs, and so on, generation after generation of ASIC chip mining machines that were createdfor the mining priced thousands of dollars, these constantly updating equipment, in addition to the internal friction of the accounting rights, and there is no other value for humanity.
The consumption of electricity is even more fearless. According to DigiConomist, 2017, bitcoin mining consumes 30 billion kilowatts of electricity, accounts for 0.13% of global electricity consumption, exceeds the national electricity consumption of dozens of countries, and showing a rising trend year by year.

The Vision Network pioneered the definition of the Proof of Traffic consensus mechanism, the VISION node has only a very low performance requirement for the device, rather than a more meaningful power race. A Raspberry Pi (see attached, only consumes 1 degree of electric power per week) which priced $35, is enough to meet the hardware requirements of a node, and higher computing performance will not bring about a linear increase in revenue.
In the age of the Internet, bandwidth and traffic are clearly valued and easily measurable resources. Quantifying the traffic services provided by nodes as universal equivalents that are more currency means not only a solid value base but also Voken’s dollar price is more stable, and can effectively avoid the news pricing, PR pricing, emotional pricing. And on the other way, it effectively avoids unrestrained price speculation at the same time.
The price of resource in an IDC¶
For 1,000 GB network traffic, there is a price reference for mature IDC, with Amazon Web Services AWS, for example, priced at about $85 per 1,000 GB traffic and Google Cloud Platform GCP at about $80.
Accelerating traffic is more expensive, while ordinary traffic is cheaper.
CDN needs node storage and outlet traffic, and VPN service needs both down-link and up-link traffic to complete proxy forwarding, that is, 1,000 GB client traffic is about equal to the traffic of 2,000 GB on the service-side (1,000 GB up-link 1,000 GB down-link).
Therefore, 1,000 GB client traffic flow, anchored to 1 Voken, also coincides with the actual intrinsic use value.
- AWS Amazon Web Services:
- GCP Google Cloud Platform:
The Voken dollar price should increase to the internal value gradually and be relatively stable¶
We believe that the legal currency will not disappear in the short term, and that long-standing habits will allow more people to use the fiat currency to price products or services. At the same time, we expect that the Voken value scale after ecological maturity is relatively stable (that is, the legal currency price is relatively stable), and the basic setting of 1 Voken = 1,000 GB can ensure that the market circulation price of Voken gradually matures with the ecological value in practical use value.
Official server nodes around the world would provide initial ecological services to users¶

In the initial stage of ecological start-up, the official server nodes in 86 IDCs around the world will provide stable services to users. As time goes on, more node programs will be run by users, and the ecology will become more mature.
Technical path¶
Note
The content of this page is subject to re-editing.
vnP2PNET and vnNODE¶
Distributed peer-to-peer networks, all over the world.
vnP2PNET is the basis for the interconnection and interoperability of nodes in the entire the Vision Network.
The vnNODE user nodes all over the world run on the basis of a series of protocols and rules, which constitute the vnP2PNET distributed peer-to-peer network. These techniques are being used in several scenarios and systems such as BitTorrent, BitCoin and Ethereum and have been validated and basically mature.
vnCHAIN, Blockchain¶
The design and implementation of the vnCHAIN main chain will be as simple as possible to keep the minimum requirements for computing and storage resources of the node. Storage updates, clearing, and contract execution of the latest vnPAC rules will occur on the vnCHAIN main chain, while expired data will be considered redundant and automatically backed up to other symbiotic decentralized systems (such as IPFS / EOS, etc.) for queries. And of course, nodes can also choose to save the full height of blocks (the default is to save blocks and snapshots for 255 days).
vnCHAIN uses the PoT consensus mechanism and the random accounting strategy, and there is no possibility of computing competition, which further reduces the requirements on node hardware and increases scalability.
Allow one-to-many bindings and untying of vnWallet and vnNODE¶
Using the logical structure of the vnWallet parallel to the vnNODE, vnWallet and vnNODE use mutually independent private and public keys, and vnWallet and vnNODE can transfer freely between themselves.
Allow one-to-many bindings and untying of vnWallet and vnNODE:
Allow vnWallet and vnNODE to be associated with a simultaneous signature. After the binding, the VNET Tokens for both vnNODE cost and revenue will be automatically included in the address of the corresponding vnWallet.
Allow vnWallet to initiate unbundling of vnNODE operations with a unilateral authorization signature. After unbinding, the cost and revenue of vnNODE are no longer associated with the past vnWallet, but only belongs to the vnNODE’s own address.
vnSDK¶
The vnSDK is the first end-user application built on a vnP2PNET (encapsulating the vnRPC at the same time). This development kit defines a set of standards and provides a convenient interface for the end user to take advantage of the vnCHAIN. At the same time, it gives VISION the potential to expand the scale in the future. Whether it is an official application or the participation of more partners or organizations in the application development of VISION in the future, the vnSDK will provide more convenience and will promote the entire ecosystem to be more open and colorful.
vnVPN model and principle¶

vnFREE non-state protocol¶
The exclusive algorithm vnFREE stateless protocol, based on TCP, can achieve second-level switching of service nodes without waiting for software disconnection and reconnection like traditional VPN. Military-grade AES-256 encryption, and then superimposing obfuscated packets, makes it more similar to the traffic characteristics of HTTPS and it is difficult to be detected by DPI deep packet inspection.
- TCP:
- AES:
- Deep Packet Inspection:
vnTUNNEL, Dynamic encrypted tunnel¶
Based on the mature OpenVPN, we add the obfuscation feature like Shadowsocks(r), and develop a kind of proprietary protocol of continuous connection, which can use both UDP and TCP mode, dynamic certificate encryption. When the bandwidth condition of service node is good, shorter delays and higher response efficiencies can be achieved.
- Tunneling Protocol:
vnDNS, Non-pollution distributed domain name service¶
Although some international companies or organizations can provide clean DNS resolution services (such as IBM, Google, CloudFlare, etc.). Users still have the possibility of failing to obtain the correct resolution results, because communication packets may still be intercepted and tampered with by the ISP
Based on distributed network technology, Distributed Domain Name Service is implemented. You are protected from DNS cache pollution.
In the initial implementation of vnDNS, the node agent parsing in trusted area will be the main way to transmit the communication in the network through the dynamic encryption tunnel, and the data will be trusted. Will no longer be hijacked interception and pollution, the later development will be upgraded to a fully independent distributed DNS function of the service application
- DNS pollution:
- Google Public DNS:
DDoS defense which is derived from vnDNS¶
The completely free distributed vnDNS resolution service can also be combined with reverse proxy technology, with the help of the huge VISION user base and the number of nodes, VISION could protect website from DDoS attacks. The website pays VOKEN – Unique token in the Vision Network ecosystem, and the participating nodes get Vokens as revenue.
Vision Network users can not only contribute to network security protection, but also increase VOKEN – Unique token in the Vision Network ecosystem revenue.
vnPAC Smart routing Automatic judging and updating based on ASN in ISP region¶
PAC, Proxy auto-config
vnVPN does not set a centralized PAC file, it will automatically identify the user’s ISP’s system number - ASN, automatically determine whether the connection is unblocked, automatically determine whether other nodes in the ASN area are unblocked, automatically update the results with the proxy rules, and perform a smart routing (only when the proxy is necessary).
Ordinary users can use the network services without any complicated manual configuration and only need to keep the vnVPN program running in the background.
- ASN:
vnCDN¶
A brief description of vnCDN has been provided in the Application description and economic model section of the previous section. The traditional CDN technology is so mature that the benefits of universal participation, efficiency improvement, cost reduction, and service transparency brought about by the integration of blockchain and token are even more obvious.
We won’t waste too many repetitions in this article. And only attach CDN terms on Wikipedia for reference:
Tokenomics¶
This VOKEN Economics document outlines VOKEN pricing, supply allocation, and lockup schedules.
Use it, invest it, not hype it¶
This is also our blockchain technology application value philosophy.
We are building an increasingly mature system, in which VOKEN – Unique token in the Vision Network ecosystem will be the only measure of value and means of payment in such a sustainable and healthy environment. It is clear that the basic design of 1 Voken = 1,000 GB after ecological maturity will ensure that the price of Voken is not destined to deviate too much from the anchoring of its actual use value. We expect users with real demands to buy Voken and use it for appropriate network services. Of course, the value logic of Voken is so clear that proper investment maybe also a good choice.
Resource Anchored¶
1 VokenTB ~ 1,000 GB general traffic
Total Supply: 210 Million¶
This is final - total supply is not subject to change.
Deflation-oriented¶
The project vision network is building one of the next-generation infrastructures of the Internet. As the digital world’s blood in this globalized ecosystem, VokenTB is a necessary resource and used by more and more people.
As the ecology matures, the total supply of 210 million will become scarce.
Designed for value-driven dApps¶
Most of the blockchain projects we’ve seen already are only accounting. Meanwhile, the vision network really matches supply and demand in the ecosystem that providing real services, starting with proxy service.
We believe that vision network will be UNIQUE and completely different from other blockchain projects that only care about accounting.
Dynamic anchoring allowed¶
Briefly.
Even when there are only proxy providers/consumers in the service market.
The benefit of the scarcity design is that as the ecology matures, it becomes clear that the amount of VOKENs in circulation is not enough to meet the huge market demand and the price rises.
At this point, some service providers will raise anchoring in order to keep their prices competitive to attract more users to choose them.
We anticipate that the anchored resources will be several times more than 1,000 GB when the market reaches a dynamic equilibrium.
so…?
Transfer with burning & Trade without burning¶
- Transfer with burning: 1.0% - 3.0%
Only on Ethereum blockchain, after fundraising and before migration to vnCHAIN main net.
- Trade without burning
UniSwap (DEX) is the only recommended trading route, without burning, neither buying nor selling, anyone.
- Benefits
Avoid the impact of CEX. No fake tokens any more.
Avoid the impact of malicious speculators.
Avoid malicious price manipulation by a few people through matched orders.
Avoid malicious over-price or under-price OTC trading.
Plentiful liquidity for buyers and sellers at DEX (everyone can join).
Distribution¶
- Team Foundation: 10%
Locked then released in tranches to demonstrate long-term commitment.
Vested over 9 years
1/60 released monthly, from 2025-01-01 to 2029-12-31 (UTC+0)
- Advisors: 2%
Reserved for the vision network advisory board.
These tokens are vested over 9 years in demonstrating long-term commitment.
1/84 released monthly, from 2023-01-01 to 2029-12-31 (UTC+0)
- Angel Investors: 10%
These tokens are vested over 7 years in demonstrating long-term commitment.
1/60 released monthly, from 2023-01-01 to 2027-12-31 (UTC+0)
- Private: <10%
Upgrading from the deprecated tokens (100 GB version).
Vested with the Public-Sale (coming soon).
10% released according to the process of public-sale
90%/1080 released daily after Public-Sale finished
- Early-Bird: 5%
Early bird has more advantages compared to the Public-Sale (coming soon). So most of the positions will be released in parallel with the users of the Public-Sale.
10% released instantly
90% released according the process of the Public-Sale
- Public-Sale: 40%
10% released instantly
90% released according to the Public-Sale (coming soon) process
- Account Miner: 5%
Mining begins after the main network is officially launched.
0.03 VokenTB per block
1% reduction per 1,000,000 blocks
Stop rewarding if less than 0.001
- Business Fund: 18%
For containers, interfaces, business partners, sales bonus, community awards, etc.
More¶
Note
The content of this page is subject to re-editing.
Thinking about Tor Network¶
After the PRISM incident, privacy protection has been increasingly focused and respected by every user who needs network security communications.
Tor, The Onion Router, is an open source, free software for anonymous communications. The project was initially sponsored by the Naval Research Laboratory. It can help users communicate and browse. Tor anonymously on the Internet through the way of Entry node, Middle node and Exit Node multi-layer proxy, which makes the user’s true source IP untraceable.
Obviously, the design of vnVPN has naturally satisfied the technical foundation for preventing tracking, anonymous browsing and communication. If VISION goes one step further and implements a multi-proxy application vnTOR, vnTOR has obvious advantages over the original Tor network. In other words, an ecosystem that uses Voken can motivate the participation of nodes (more service nodes participate, not just use and claimants), and network quality and service quality are more stable and more efficient.
- 2016 Movie Snowden:
// English
magnet:?xt=urn:btih:3937111709900e5d58c2c8945d9abe63365c4545&dn=Snowden.2016.1080p.WEB-DL.HEVC.x265.Ac3.6Ch-NEBO666
// Chinese
magnet:?xt=urn:btih:44bb5bbe5afcffd391dec35ec9359ae07022f2b8&dn=%E6%96%AF%E8%AF%BA%E7%99%BB.2016.%E4%B8%AD%E8%8B%B1%E5%AD%97%E5%B9%95%EF%BF%A1CMCT%E6%AD%BB%E4%BA%A1%E9%AA%91%E5%A3%AB
vnTOR, Extensible anonymous network service¶
Obviously, Tor has great value and reference value for the exploration and implementation of the network’s anonymity and neutrality, and we believe that the crux of the problem that currently leads to the slow and unsuitable use of the Tor network lies in the no incentives. Most of the users who participate in Tor are requesters. They are online when they use it, and they don’t keep running when they are not used. As a result, the number of service nodes is in the state of shortage of demand for a long time.
According to the actual development of the Vision Network project and opinions of the community, we may develop and implement the vnTOR multi-proxy function in the later period (the user selects the number of proxy layers and pays the corresponding Voler to drive two or more nodes to participate in the routing of data packets. The user can know the node_id of the service node on the path, and the service node is only responsible for completing the data packet routing between the adjacent nodes. The user’s source IP is invisible to both the intermediate node and the target website.) It can even be connected to Tor. The network is open, allowing users to visit the address with an .onion suffix, even you can use Hidden Wiki and the Torch search engine.
Of course, this part of the work in the future is likely to involve more implementable developers in the design and application by rewarding Vokens.
- The Hidden Wiki:
Future services based on Vision Network will also be settled using Voken¶
Benefit from the stable value anchor design of Voken, which makes Voken closer to the true currency (value scale is stable, convenient to hold and circulate). In a sense, not only the software and services officially developed by Vision Network. With the promotion of development support policies and support funds, more third-party software will also use Voken for service settlement.
Conclusion¶
Vision Network takes the whole network interworking service vnVPN as the breakthrough point, the demand is rigid, the cardinality is huge, the technical path is clear, in view of the network blockade restriction question and so on, provides the systematic solution and the ecological incentive mechanism. It is easy to quickly form user and ecological advantages, which is helpful to further promote vnCDN content accelerated distribution services and more service applications. Vision Network, a distributed extensible virtual network is growing into a distributed Internet infrastructure.
The voken’s value anchoring rules, which define the clear value scale in the codes, will lead to relatively stable dollar price of the Voken. It is the unique ticket in the Vision Network ecosystem, and it is more likely to make it a cross-ecological and easy-to-use generic equivalent.
Special tips¶
The Vision Network team will not ask users to transfer their VOKEN – Unique token in the Vision Network ecosystem to any wallet address and non-source verified smart contract address at any time. Please pay attention to the security of assets.