In the era of Blockchain, security is the number one thing which most people stress about and I am happy to say that most of us are very clued up about the importance of it, but until now there hasn’t really been a completely secure way to protect your online browsing and presence.
This is where I want to introduce Tachyon which is a decentralized internet protocol for online privacy & security co-launched by V SYSTEMS and X-VPN. Now this project is so much more than a VPN provider (this is just their first product) and what they offer so much more than the VPN services any of you use simply because current VPN services still store your data and are centralized. So if you are looking for ultimate privily then this is the VPN service for you.
I recently did a review video about the project and wanted to share the Q&A I did with the team on this blog in case you prefer to read it, if not here is the link to the video itself:
If you wish to read the Q&A you can do so here, the answers below are much more detailed than the video for anyone who really wants to understand the tech:
Q1) The thing that stood out to me the most is that with Tachyon our data transfer speed can be 10x faster, explain to us exactly how this works?
The speed of the network transmission mainly depends on three factors: 1. the current network environment; 2. the transmission protocol used; 3. the transmission path
- Current network environment:
There are many influencing factors in the network environment that can cause the network connection failure, which will take a lot of time to re-establish the connection. For this reason, Tachyon Protocol can increase the connection success rate to 90% or above in the complex network environment by identifying the current network environment and selecting the available protocols.
- Transmission protocol:
We all know that TCP is a reliable transmission protocol. It is generally used as the protocol of the transport layer. However, in order to maintain reliability, TCP protocol has made some compromises in terms of transmission speed:
- TCP protocol requires three handshakes to establish a connection, and it takes four hand waves to disconnect, which consumes a certain amount of time;
(2) TCP header data is 20bit~60bit, which also occupies part of the transmission time;
(3) In order to ensure the reliability of message transmission, each packet is numbered, and the receiver receives in numbered order. If a packet (Let’s set its serial number to 100, that is, the packet starts at the 100th byte.) is lost, the receiver cannot confirm it and its subsequent packets because of cumulative acknowledgement. The receiver sends an acknowledgment of the packet containing the 99th byte when it receives the packet after 100. This repeated acknowledgement is a signal of packet loss. If the sender receives 3 acknowledgements of the same packet, it retransmits the last unacknowledged packet. A part of the transmission time is also consumed during the packet loss processing;
(4) If the congestion control algorithm of the TCP protocol encounters large-scale congestion, it will consume a lot of time to recover to the peak traffic.
The above-mentioned problems do not exist in the corresponding UDP protocol, so the transmission efficiency of the UDP protocol will be higher. Especially in the case of network congestion, the advantage of UDP in transmission speed will be significantly greater than that of TCP; Tachyon Protocol uses UDP protocol instead of TCP for the primary transport protocol of transport layer, utilizes bandwidth-aware technology to maximize bandwidth utilization. In view of the nature of UDP, Tachyon also uses ACK management, FEC (Forward Error Correction) and other technical solutions to improve its reliability. Google’s QUIC and IBM’s Aspera are optimized at this level, and they have achieved great results.
- Transmission path:
The transmission path has a great influence on the transmission speed, particularly in long-distance transmission scenarios. Tachyon combines the real-time delay, packet loss, and bandwidth information in the node to obtain the transmission efficiency between nodes in the routing path, select the appropriate transmission path, and maximize the transmission speed.
With the above improvements, Tachyon Protocol can increase the transmission speed by 10 times in the complex network environment.
Q2) So exactly how will an everyday user of a VPN service will be able to access your service?
We will provide clients for iOS, Android, Windows, macOS and other systems, and the community will also launch their clients for users based on our open source kernel.
Q3) Explain to us why someone using VPN need extra security?
Having been working in the industry for many years, we have discovered the shortcomings of centralized VPN and learned about some industry insiders. VPN users generally care about network security and privacy protection, but in fact, centralized VPN cannot effectively provide its claimed network security, privacy protection and other services owing to the centralized VPN architecture and its unregulated operations.
- Some VPN service providers themselves ignore the log retention policy and try to capitalize by reselling user data;
- Subject to legal requirements and administrative orders, centralized VPN service providers are susceptible to monitoring by powerful authorities;
Of course, X-VPN adheres to the responsibility of users in these areas, and protects user privacy to the greatest extent.
Q4) I can see you focus on other industries also, such as IOT, gaming cloud storage and others, tell us where you see yourself in the future?
Yes, Tachyon Protocol is a bottom layer infrastructure for communication protocols, which has a wide range of applications. From the perspective of its application, as long as there is communication transmission, there are scenarios for its use. This is why we define Tachyon as the next generation of TCP/IP. However, the whole Internet is built on TCP/IP, so our intention is not to replace it completely, but to upgrade in some advantageous scenarios. After the observation and experiment, in the business scenarios such as VPN, CDN, Storage, Defi, IOT, DNS, Tachyon Protocol has a stronger advantage. We expect to introduce Tachyon Protocol into these scenarios in recent years. As for the real future, no one knows what will happen. Dream as if it were to come true. It does.
Q5) Personal congratulations for being the first addition to the V systems Blockchain, is there anything else you wish to tell your community?
Since our team has been focused on the technology of online privacy & security over 5 years. We finally realized there are no better way to solve the present problems with a centralized internet. So we came to the blockchain world to look for the solution. We found our answer. That’s Tachyon Protocol we built for everyone.
Tachyon team has been on the quest to provide an Internet with more privacy, security and freedom. Succeeding in this would mean significant improvement to the internet infrastructure as well as the decentralization of an ever greater number of internet services. After witnessing the trust crisis in the traditional internet world, we believe that this project do help something.It is meaningful and valuable for all internet citizens.
We know we can’t do this alone. There is always a strong community power supporting us. We want to express sincere thanks to all community members. With your participation and contribution, Tachyon will go further.
Hope all of you enjoyed this technical interview and I strongly suggest you join their community and try out their trial when it is launched in December.