Compare commits

31 Commits

Author SHA1 Message Date
5d84d67c62 ... 2025-02-25 05:14:50 -07:00
1ae651d669 ... 2025-02-18 18:20:00 +03:00
mik-tf
6063ba93ad updafe cfg 2025-02-11 21:12:05 -05:00
mik-tf
3f89a1318f updafe cfg 2025-02-11 20:55:23 -05:00
mik-tf
e036fc27b8 updafe cfg 2025-02-11 20:52:35 -05:00
mik-tf
5004710640 updafe cfg 2025-02-11 20:45:52 -05:00
4b4dac1191 Update README.md 2025-02-10 12:24:15 +00:00
e6fb0d40f7 ... 2025-02-10 15:21:49 +03:00
d21b199c1a ... 2025-02-10 09:39:58 +03:00
ab9f25ca36 Merge branch 'main' of git.ourworld.tf:tfgrid/info_docs_tfgrid4_tech 2025-02-06 19:55:13 +03:00
d05598ed0c .... 2025-02-06 19:55:08 +03:00
129516856b Update README.md 2025-02-05 10:43:38 +00:00
19527cc5a3 ... 2025-02-05 12:54:34 +03:00
10038d2fc0 Merge branch 'main' of git.ourworld.tf:tfgrid/info_docs_tfgrid4_tech 2025-02-05 12:52:26 +03:00
17b8c85fb6 /// 2025-02-05 12:52:18 +03:00
b9c0d6bd4a s 2025-02-05 10:18:26 +03:00
89344af7b1 s 2025-02-05 10:18:00 +03:00
020e87a0dd s 2025-02-05 08:43:39 +03:00
9e16aec7ad ddd 2025-02-05 08:25:52 +03:00
8466fc55ee update docs 2025-02-05 07:26:26 +03:00
a070bc7df5 Merge pull request 'update breaking changes' (!9) from main_update_breaking into main
Reviewed-on: tfgrid/info_docs_tfgrid4_tech#9
2025-02-02 15:40:57 +00:00
mik-tf
2f573c605e update breaking changes 2025-02-02 10:40:26 -05:00
0248a18b0a ... 2025-01-30 15:50:52 +03:00
bb1e32a837 ... 2025-01-30 14:04:43 +03:00
d2bed074b0 ... 2025-01-28 18:34:18 +03:00
emre
26c95c2b7a Merge pull request 'sovereign-->autonomous, web0-->web4' (!8) from development into main
Reviewed-on: tfgrid/info_docs_tfgrid4_tech#8
2025-01-28 12:17:03 +00:00
remrekoc
fcfe288cb6 sovereign-->autonomous, web0-->web4 2025-01-28 12:27:41 +03:00
383f8731ab Fix bun installation 2025-01-27 15:02:10 +00:00
56650bceda ... 2025-01-26 07:03:35 +03:00
8e5f46cd21 Merge branch 'main' of git.ourworld.tf:tfgrid/info_docs_tfgrid4_tech 2025-01-24 22:22:39 +03:00
a70cab17de ... 2025-01-24 22:22:34 +03:00
246 changed files with 1 additions and 4095 deletions

23
.gitignore vendored
View File

@@ -1,23 +0,0 @@
# Dependencies
/node_modules
# Production
/build
# Generated files
.docusaurus
.cache-loader
# Misc
.DS_Store
.env.local
.env.development.local
.env.test.local
.env.production.local
npm-debug.log*
yarn-debug.log*
yarn-error.log*
bun.lockb
yarn.lock

21
LICENSE
View File

@@ -1,21 +0,0 @@
MIT License
Copyright (c) 2024 ThreeFold.
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.

View File

@@ -1,37 +1 @@
<h1>ThreeFold Tech Website</h1>
<h2>Table of Contents</h2>
- [Introduction](#introduction)
- [Steps](#steps)
- [URL](#url)
---
## Introduction
This repository contains the code to deploy the ThreeFold Tech website.
## Steps
- Install
```
bash install.sh
```
- Run locally
```
bash develop.sh
```
- Push change online to stating website
```
bash build-dev.sh
```
- Push change online to production website
```
bash build.sh
```
## URL
- The website in staging mode is at `threefold.info/tftechdev`
- The website in production mode is at `threefold.info/tftech`
everything moved to tech dir in docs_tfgrid4

View File

@@ -1,20 +0,0 @@
#!/bin/bash
set -ex
script_dir="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
cd "${script_dir}"
export PATH=${BASE}/node_modules/.bin:$PATH
echo "Docs directory: $script_dir"
# Change baseUrl to '/tftechdev/'
sed -i "s|/tftech/|/tftechdev/|g" docusaurus.config.ts ./src/pages/index.tsx
bun docusaurus build
rsync -rv --delete ${script_dir}/build/ root@info.ourworld.tf:/root/hero/www/info/tftechdev
# Change baseUrl to '/tftech/'
sed -i "s|/tftechdev/|/tftech/|g" docusaurus.config.ts ./src/pages/index.tsx

View File

@@ -1,14 +0,0 @@
#!/bin/bash
set -ex
script_dir="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
cd "${script_dir}"
export PATH=${BASE}/node_modules/.bin:$PATH
echo "Docs directory: $script_dir"
bun docusaurus build
rsync -rv --delete ${script_dir}/build/ root@info.ourworld.tf:/root/hero/www/info/tftech

View File

@@ -1,14 +0,0 @@
#!/bin/bash
set -ex
script_dir="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
cd "${script_dir}"
echo "Docs directory: $script_dir"
#export NODE_OPTIONS=--openssl-legacy-provider
#npm run start -- --host 0.0.0.0
bun run start -p 3100

View File

@@ -1,7 +0,0 @@
{
"label": "Geo Aware AI Agent",
"position": 5,
"link": {
"type": "generated-index"
}
}

View File

@@ -1,55 +0,0 @@
---
title: Geo Aware AI Agent
sidebar_position: 2
hide_title: true
---
## Hero Geo Aware AI Agent
![](img/capabilities.png)
Imagine a world where you are in full control of your digital life—your communications, creativity, transactions, and data all managed seamlessly, securely, and privately. This is the future of the internet, and its happening now.
The traditional internet relies on centralized systems that often compromise privacy, security, and freedom. Every message, every file, every transaction is routed through servers owned by corporations, leaving you with little control over your data. The new internet powered by ThreeFold changes that by decentralizing everything, ensuring you own your digital identity and interactions.
With this paradigm shift, you can communicate effortlessly with peers through video conferencing or chats while your personal AI manages and organizes conversations. Discovering information becomes easier and faster, tailored to your needs, without fear of data surveillance. Creativity flourishes when you can produce videos, collaborate on documents, and innovate without limitations, all on a secure and private infrastructure.
Developers and innovators can create and deploy applications at unprecedented speeds, leveraging decentralized storage and networking for unparalleled performance. Sharing becomes frictionless—publish data, files, and videos directly without centralized servers dictating what, where, and how you share. Transactions, once cumbersome and insecure, now happen in seconds, safeguarded by a decentralized framework that ensures trust and transparency.
This matters because it puts the internet back into the hands of people. It is the internet designed for individuals, not corporations. Decentralization guarantees that your data, privacy, and freedom are no longer commodities but rights. This is not just an evolution; its a revolution in how we live, work, and connect—a future where you are truly in charge.
> Note: the Hero Agent is also called the 3AI in some pictures.
## How it Works
![](img/3ai_overview.png)
This system seamlessly integrates with your existing devices by leveraging standard Web 2 and Web 3 protocols, ensuring compatibility across phones, laptops, desktops, and other devices without requiring specialized hardware or proprietary systems.
- **Personal AI Hosted on Sovereign Infrastructure**: Your **Hero** can be hosted on a secure **3Cloud** or **3Phone**, ensuring your contextual data—like your calendar, email, and contacts—is stored securely and privately. This means your data remains under your control, regardless of the device you're using.
- **Access From Any Device**: Whether you're working on a laptop, another phone, or a desktop, you can connect to your personal AI seamlessly. It bridges the gap between devices, making transitions effortless while maintaining privacy and security.
- **Standard Protocols for Universality**: By using widely adopted Web 2 and Web 3 protocols, the system ensures interoperability with all modern devices and applications. There's no need to overhaul your existing workflows or technology.
- **Secure and Flexible Work Environment**: For enterprises, governments, or individuals, the system provides a **quantum-safe working environment**. This ensures sensitive information is protected while enabling seamless access across different devices.
This integration brings convenience, security, and privacy together, empowering users to work, communicate, and manage their lives without sacrificing compatibility or ease of use.
### Hero: Sovereign AI Agents for a Secure and Convenient Future
![](img/ai_agent.png)
Hero agents represent a new paradigm where personal sovereignty meets cutting-edge AI capabilities. These agents are designed to work on your behalf, ensuring your data remains secure while making your life more efficient and manageable.
All Heros are connected to geo aware sovereign or centralized AI models but operate in a secure way that gives you full control over your data. You decide what information is shared or exposed, maintaining complete ownership of your digital life.
Hero enhances convenience with features like conversational interfaces, automating repetitive tasks, transcribing meetings, and helping you find information faster. By managing the "boring side" of your digital interactions, these agents free up your time for more meaningful activities.
Depending on the task, your Hero can intelligently select the most appropriate AI model to work with, ensuring efficiency and relevance. Most of the processing happens locally on your 3Phone or other secure devices, reducing reliance on external systems and protecting your privacy.
Hero agents also enable the creation of **sovereign knowledge networks**, where individuals and organizations collaborate securely and independently of centralized control. These networks allow data and knowledge to flow freely without compromising privacy or sovereignty.
By serving as your interface to large language models and other AI systems, Hero ensures your digital interactions are secure, efficient, and aligned with your needs. This represents a future where technology works for you, on your terms, with the highest level of security and convenience.

View File

@@ -1,19 +0,0 @@
---
title: Blockchain
sidebar_position: 4
hide_title: true
---
## Hero and Blockchain
![](img/ai_ai.png)
Hero introduces **RecordChain**, a personal private ledger that ensures all your data and transactions remain secure, decentralized, and under your control. Each Hero agent maintains its own blockchain, acting as a **personal ledger** that protects your data on devices like the 3Phone.
The system enables seamless communication across **peer-to-peer networks**, allowing Hero agents to exchange information securely without relying on centralized intermediaries. This design supports both **private blockchains**, such as those used by enterprises or governments, and **public blockchains** within the broader Web3 ecosystem.
Your Hero agent automates and streamlines business processes by integrating with the necessary blockchains. Whether it's managing enterprise tasks, facilitating transactions, or interacting with decentralized applications, Hero ensures efficient and secure operations across all layers.
This interconnected yet decentralized setup allows individuals and organizations to automate repetitive tasks, conduct business securely, and maintain sovereignty over their data. By bridging private, public, and personal blockchain networks, Hero creates a future where technology simplifies life while enhancing privacy and trust.

View File

@@ -1,35 +0,0 @@
---
title: Data Layer
sidebar_position: 5
hide_title: true
---
## Hero and Data
![](img/ai_data.png)
### Your Data: Secure, Uncorrupted, and Always Accessible
The ThreeFold system ensures that your data can never be lost, corrupted, or hacked by leveraging **Zero Knowledge Quantum Safe Encoding** and a **unique dispersal algorithm**. Heres how it works:
#### **1. Geo Aware and Distributed Data Storage**
- **Data Location Control**: Through your Hero, you decide where your data is stored. This means your data can be distributed across multiple geographically relevant locations, ensuring proximity and compliance with regional data sovereignty laws.
- **Dispersal Algorithm**: Your data is fragmented into smaller pieces, encoded, and distributed across multiple independent storage nodes (3Nodes). These pieces are stored in a way that no single node—or even a group of nodes—can reconstruct the data.
#### **2. Quantum-Safe Security**
- **Zero Knowledge Encoding**: The dispersal algorithm is quantum-safe, meaning it is resistant to even the most advanced hacking technologies, including quantum computing. Without access to the complete set of fragments and the encryption key, your data is unreadable.
#### **3. Exclusive Access via Hero**
- **Controlled by Your Hero**: Only your Hero has the cryptographic keys and protocols to reassemble and decrypt the data. No third party, not even the nodes storing the fragments, can access your data.
- **Peer-to-Peer Security**: When your Hero needs to retrieve data, it securely communicates with the storage nodes to reconstruct it without exposing any sensitive information.
#### **4. Data Redundancy and Fault Tolerance**
- **Resilience Against Failures**: The system is designed to maintain multiple copies of data fragments across geographically dispersed nodes. If a node goes offline or fails, the remaining fragments ensure uninterrupted access to your data.
- **Immutable and Unhackable**: Since no complete dataset resides on any single node, and all fragments are quantum-encrypted, your data is immune to tampering or unauthorized access.
#### **5. You Always Stay in Control**
- Your Hero is the sole gatekeeper for your data. With it, you can choose the level of redundancy, control data retention, and ensure your information aligns with your needs while staying completely private.
In this architecture, your data is geo aware, secure, and accessible only to you. No centralized server or third-party authority can compromise your information, making it future-proof and reliable for all your digital interactions.

Binary file not shown.

Before

Width:  |  Height:  |  Size: 103 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 125 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 103 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 100 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 109 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 123 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 555 KiB

View File

@@ -1,41 +0,0 @@
---
title: Network Layer
sidebar_position: 6
hide_title: true
---
## Hero and Network
![](img/ai_network.png)
### Mycelium Network: An Unbreakable and Adaptive System
The Mycelium Network ensures an unbreakable connection between all **Hero agents** through its highly resilient and intelligent design. Heres how it works:
#### **1. End-to-End Encryption and Unique Addresses**
- Every **Hero agent** has a **unique private network address**, ensuring that all data exchanges are highly secure and completely isolated from unauthorized access.
- All communications are **end-to-end encrypted**, providing quantum-safe security against even the most advanced threats.
#### **2. Multi-Path Connectivity**
- The Mycelium Network operates over a variety of connection types, including **5G, Wi-Fi, fiber internet, and satellite links**. This redundancy guarantees that even if one type of connection fails, others can maintain uninterrupted service.
#### **3. Dynamic Path Optimization**
- The network continuously **reroutes itself**, always seeking the shortest and most efficient path between two **Hero agents**. This intelligent routing minimizes latency and optimizes performance in real time.
#### **4. Fault Tolerance and Self-Healing**
- If a node or connection becomes unavailable, the network automatically finds alternative paths, ensuring no single point of failure. This **self-healing capability** makes the system virtually unbreakable.
#### **5. Context-Aware Networking**
- The system adapts based on the context of the communication, prioritizing the fastest and most secure route for critical data while balancing efficiency for less sensitive tasks.
#### **6. Decentralized Infrastructure**
- The decentralized architecture of the Mycelium Network means no central authority or server can disrupt or control the system. Every node contributes to the networks resilience and ensures uninterrupted connectivity.
---
### **Why Its Unbreakable**
- **Redundant Paths**: With connections spanning multiple technologies (5G, fiber, satellite, Wi-Fi), theres always an available route.
- **Self-Healing Mechanisms**: The network instantly adjusts to outages, ensuring constant availability.
- **Decentralized Design**: No single point of failure ensures resilience against attacks or failures.
This design creates an adaptive and resilient network that not only keeps your data safe but also guarantees uninterrupted and efficient communication. The Mycelium Network is the backbone of a new era of connectivity, prioritizing speed, security, and reliability for all users.

View File

@@ -1,61 +0,0 @@
---
title: Phone
sidebar_position: 7
hide_title: true
---
## Hero on a Phone
![](img/phone.png)
### A Phone as the Heart of Your Decentralized Digital Life
This phone is not just a communication device—it is a **personal gateway to your decentralized digital ecosystem**, seamlessly integrating all the components of **Hero**, the **Mycelium Network**, and the secure infrastructure discussed above. Heres how it brings everything together:
---
#### **1. Hosting Your Personal Hero**
- **Your Personal Assistant**: The phone hosts **Hero**, your always-available digital agent. It manages tasks like communication, scheduling, searching, secure transactions, and more, acting as your digital representative.
- **Privacy by Design**: All data processed by Hero remains on your device or within your **sovereign storage network** (e.g., 3Cloud or decentralized nodes), ensuring no external access to your sensitive information.
---
#### **2. Powered by Mycelium Network**
- **Unbreakable Connectivity**: The phone is seamlessly connected to the **Mycelium Network**, enabling peer-to-peer communication over Wi-Fi, 5G, satellite, or fiber. The network dynamically routes traffic, ensuring the shortest and most secure path to other devices and nodes.
- **Decentralized Infrastructure**: It does not rely on centralized servers for operations. Instead, it leverages the global ThreeFold Grid, enabling unmatched security and resilience for communication and data exchange.
---
#### **3. A Quantum-Safe Environment**
- **Data Encryption**: The phone integrates with the **Zero Knowledge Quantum-Safe Encoder**, protecting all communications and data exchanges with quantum-resistant encryption.
- **Dispersed Data**: Your data is encoded, fragmented, and stored across multiple nodes. Only your phone, via Hero, can retrieve and reconstruct it.
---
#### **4. Hosting Personal Blockchain (RecordChain)**
- **Private Ledger**: Your phone hosts your personal blockchain, known as **RecordChain**, which logs all important actions and transactions securely. This ensures complete transparency and traceability, under your control.
- **Interoperability**: The phones RecordChain integrates with both private blockchains (e.g., enterprise systems) and public Web3 blockchains for seamless interaction across ecosystems.
---
#### **5. Fully Functional for Business and Personal Use**
- **Unified Ecosystem**: Whether for personal or enterprise use, the phone becomes the control center for communication, data, and transactions. It automates mundane tasks, helps you collaborate securely, and simplifies digital workflows.
- **Ready for Web3**: With native blockchain compatibility and decentralized app support, the phone is a powerful tool for navigating and contributing to the Web3 world.
---
#### **6. Geo-Aware and Decentralized**
- **Local Storage Decisions**: The phone allows you to decide where your data is stored geographically, aligning with local regulations or personal preferences for faster access.
- **Self-Sufficient**: Even without internet connectivity, the phone communicates and performs tasks via the Mycelium Network, ensuring uninterrupted functionality.
---
### **A Revolution in Digital Sovereignty**
This phone is the backbone of your decentralized life. It combines:
- **Hero** as your personal agent and manager.
- **Mycelium Network** for unbreakable, adaptive connectivity.
- **RecordChain** for secure and private blockchain integration.
- **Quantum-Safe Encoding** for unhackable data protection.
- **Geo-Aware Data Management** for ultimate control.
Its not just a phone—its your digital companion, your decentralized workstation, and the hub of a new, sovereign internet. This is the future, now in your hands.

View File

@@ -1,77 +0,0 @@
---
title: Roadmap
sidebar_position: 10
hide_title: true
---
# Roadmap for Full Deployment
## **2025 Q2: Phone Delivery with Basic Features (Alpha)**
- **Phone Launch**:
- Deliver the first batch of phones with essential functionality and hardware.
- Integrate **Hero** with core tasks (calendar, email, search, and chat).
- **Hero**:
- Our AI agent is the core of the phone.
- **Core Infrastructure**:
- Establish connection to the **Mycelium Network** for basic peer-to-peer connectivity (Wi-Fi, 5G, satellite).
- Enable **end-to-end encryption** for all communication.
- **Data Sovereignty**:
- Deploy **Zero Knowledge Quantum-Safe Encoding** for secure local storage.
- Basic integration with **3Cloud** for optional decentralized storage.
- **Quantum-Safe Data Management**:
- Ensure all user data is securely stored using the **quantum-safe dispersal algorithm** across global 3Nodes.
---
## **2025 Q3: Feature Expansion and Usability Improvements (Beta)**
- **Enhanced Hero Functionality**:
- Expand Heros capabilities to include meeting transcription, advanced task automation, and customizable workflows.
- Improve conversational interfaces for better natural language understanding.
- **Decentralized Connectivity**:
- Full rollout of **Mycelium Network** for seamless multi-path connectivity across Wi-Fi, 5G, fiber, and satellite.
- Introduce **dynamic rerouting** for optimal speed and efficiency.
- **RecordChain Activation**:
- Enable personal blockchain functionality for secure logging and auditing of activities.
- Integrate with select private and public blockchains for Web3 applications.
- **Data Control**:
- Introduce **geo aware storage controls**, allowing users to select storage locations across regions.
- **Web3 Integration**:
- Seamless interaction with public blockchains for decentralized finance (DeFi), NFT management, and Web3 apps.
---
## **2025 Q4: Enterprise and Business Use Cases**
- **Enterprise Integration**:
- Provide support for enterprise-level applications, including private blockchain solutions.
- Enable secure access to government and corporate systems via **Hero**.
- **Business Automation**:
- Expand Heros automation capabilities to handle business transactions, reporting, and operational workflows.
- **Decentralized Collaboration**:
- Launch tools for real-time collaboration on documents, videos, and projects within the decentralized infrastructure.
- **Advanced Privacy Tools**:
- Roll out advanced **peer-to-peer secure file sharing** and messaging tools.
---
## **2026 Q1: Full Ecosystem Rollout**
- **Mass Production**:
- Scale up phone production with stable software, targeting a wider audience.
- **Hero Sovereign Network**:
- Fully operationalize Hero as a sovereign AI assistant with unmatched privacy and interoperability.
- **Decntralized Knowledge Networks**:
- Enable collaboration and data sharing between users and enterprises without central control.
---
## **2026 Q2: Global Adoption and Continuous Innovation**
- **Global Availability**:
- Expand phone delivery to more regions with localized features.
- **Network State Deployment**:
- Provide tools for organizations and nations to deploy their own decentralized networks.
- **AI Personalization**:
- Develop deeper customization for **Hero**, adapting to individual or organizational needs.
- **Full Decentralization**:
- Ensure all systems operate without reliance on centralized servers, completing the transition to a decentralized digital ecosystem.

View File

@@ -1,48 +0,0 @@
---
title: 'Avoid Painkillers'
sidebar_position: 2
---
![](img/onion.png)
> First principles thinking is a problem-solving method that involves breaking down a problem into its most basic parts and then rebuilding it from the ground up
# The Onion Analogy
Most cloud & internet stacks can be compared to an onion, where each layer represents an additional component or service added to address a problem in the system. However, like peeling an onion, as you dig deeper, you often find that these layers are not solving the core issues but merely masking symptoms, leading to a complex and often fragile structure.
## Quick Fixes and Additions
- **Problem:** When an issue arises, such as performance bottlenecks or security vulnerabilities, organizations often add another tool, service, or layer to the cloud stack to mitigate the issue.
- **Analogy:** This is akin to applying a bandage or taking a painkiller when you feel pain. The immediate discomfort might be alleviated, but the underlying problem remains untouched.
## Painkiller Approach: Treating Symptoms, Not Causes
This onion-like structure represents a "painkiller approach" to cloud management, where immediate issues are addressed with quick fixes rather than tackling the underlying problems. Over time, this approach leads to several challenges.
This onion-like structure represents a "painkiller approach" to cloud management, where immediate issues are addressed with quick fixes rather than tackling the underlying problems.
Over time, this approach leads to several challenges:
- **Cyber Pandemic** The Cyber Pandemic is real, added these layers leads to weak security.
- **Increased Complexity:** Each new layer adds complexity, making the system harder to understand and maintain.
- **Higher Costs:** More layers often mean more resources, licenses, and management overhead, increasing operational costs.
- **Reduced Agility:** The more complex the stack, the harder it is to make changes or adapt to new requirements, reducing the systems overall agility.
- **Fragility:** A stack built on temporary fixes is more prone to failures because the core issues are not resolved, making the system brittle.
### We cannot solve our problems with the same thinking we used when we created them
This is a famous quote by Einstein that we deeply admire.
Here are a few others that we strive to live by.
---------
"If I had an hour to solve a problem, I would spend 55 minutes thinking about the problem and 5 minutes thinking about solutions."
---------
"Everything should be made as simple as possible, but not simpler."

View File

@@ -1,109 +0,0 @@
---
title: 'Hardware Is Powerful'
sidebar_position: 6
hide_title: true
---
<<<<<<< HEAD
# Hardware Is Powerfull
=======
# Hardware Is Poweful
>>>>>>> f008746dae6f2bffedc655509c0c7acd4a6e7190
![](img/hardware_comparison.png)
### The IT world fails to harness the full potential of computer hardware.
While hardware advancements have surged forward, user experiences and features have often stagnated, failing to keep pace with these developments.
The original Commodore 64, with only 64 KB of memory, was a remarkably capable machine for its time. In contrast, today's computers have 8 GB or more of memory, yet their capabilities have not necessarily improved proportionately.
This highlights a regression in our ability to fully utilize computer hardware.
We are committed to bridging this gap by optimizing our approach to hardware utilization, thereby unlocking its full potential. 
## Why Are Servers So Badly Used?
![](img/layers.png)
Context switches occur when a computer's processor shifts from executing one task (or context) to another. While necessary for multitasking, too many context switches lead to inefficiency, as demonstrated in this diagram. Below, we provide a simplified explanation.
## Why Context Switches Are a Problem
### What Are Context Switches?
Imagine you're working on two tasks: reading a book and answering emails. Every time you switch between them, you lose time refocusing. Computers experience a similar "refocusing" delay when switching between tasks.
### The Layered Architecture Causes Overhead
Modern computing systems use many layers (e.g., applications, storage drivers, network layers) to get work done. Each layer requires the system to switch between different modes (user mode and kernel mode) and tasks.
For example:
- A web app might need to talk to a storage driver.
- This requires moving data through multiple layers (network, file system, etc.).
- Each layer adds a context switch.
### Millions of Switches Per Second
Each switch requires saving and loading the state of a process. This takes time and uses CPU power. When millions of context switches occur every second (as shown in the diagram), most of the computers capacity is spent switching rather than doing useful work.
### Result: Wasted Resources
- Sometimes up to 90% of the computers capacity can be lost because of this inefficiency.
- Instead of performing tasks like running applications or processing data, the computer is stuck managing unnecessary complexity.
## Simplified Analogy
Imagine driving on a highway where you have to stop and pay a toll at every intersection. You waste more time paying tolls than actually driving to your destination. Similarly, excessive context switches in modern systems cause the computer to "stop and pay tolls" constantly, leaving little time for real work.
## How Did We Get Here
![](img/eng_model_failing.png)
## How to Resolve This Problem
We decided to reinvent the way an operating system functions in a cloud and data center context.
While leveraging the Linux kernel, we rebuilt many surrounding tools to minimize complexity and reduce context switching.
This approach results in significantly improved security, scalability, and sustainability.
> [See here for more information about our operating system called Zero-OS](../key_innovations_overview/compute/zos_compute.md)
### Context Switching Details
In the context of CPU scheduling in Linux (and in most modern operating systems), a context switch refers to the process of saving the state of a currently running process (such as its registers, program counter, and other relevant information) and loading the state of a different process to allow it to run. This switching of execution from one process to another is a fundamental aspect of multitasking operating systems, where multiple processes share the CPU's time.
### How It Works
Here's how a context switch typically works in Linux:
1. **Interrupt Handling**: When a higher-priority process needs to run or an event requiring immediate attention occurs (such as I/O completion), the CPU interrupts the currently running process.
2. **Saving Context**: The operating system saves the state of the current process, including its registers, program counter, and other relevant data, into its process control block (PCB). This step ensures that when the process resumes execution later, it can continue from where it left off.
3. **Scheduling Decision**: The operating system scheduler determines which process should run next based on scheduling algorithms and the priority of processes in the system.
4. **Loading Context**: The operating system loads the state of the selected process from its PCB into the CPU, allowing it to execute. This includes restoring the process's registers, program counter, and other relevant data.
5. **Execution**: The newly loaded process begins executing on the CPU.
### Overhead and Performance Impact
Context switches are essential for multitasking, but they come with overhead that can impact system performance:
1. **Time Overhead**: Context switches require time to save and restore process states, as well as to perform scheduling decisions. This overhead adds up, especially in systems with many processes frequently switching contexts.
2. **Cache Invalidation**: Each time a process is switched in, it may result in cache invalidation, where the CPU's cache needs to be refreshed with data from the new process's memory space. This can lead to cache misses and performance degradation.
3. **Resource Contentions**: Context switches can exacerbate resource contention issues, especially in systems with limited CPU cores. If multiple processes are frequently contending for CPU time, the overhead of context switches can further delay process execution.
4. **Fragmentation**: Frequent context switches can lead to memory fragmentation, as processes are loaded and unloaded into memory. This fragmentation can degrade system performance over time, as it becomes more challenging to find contiguous slice of memory for new processes.
While context switches are necessary for multitasking, excessive context switching can indeed lead to a significant loss of execution power by introducing overhead and resource contention in the system.
Therefore, efficient scheduling algorithms and optimization techniques are crucial for minimizing the impact of context switches on system performance.

View File

@@ -1,112 +0,0 @@
---
title: 'Internet Protocol Upgrade'
sidebar_position: 6
---
![](img/tcpip.png)
The foundational protocols of the internet, TCP/IP (Transmission Control Protocol/Internet Protocol), were created in the 1970s to connect a few academic and military computers. While they served their initial purpose, they were never designed for the complex, global, and interconnected world we live in today. Even IPv6, which addresses some scalability issues, does not solve the fundamental design flaws.
### How the Internet is Broken Due to TCP/IP Design
The internet, as we know it today, is built on an outdated foundation that was designed for simpler times. Decades ago, TCP/IP was created to connect a handful of computers for research and military purposes. It worked well back then, but its no longer enough to handle the complexities of our modern, globally interconnected world. Unless we address its flaws, the internet will struggle to keep up—and could ultimately fail us.
One major issue is that the internet has no way of "remembering" conversations. For example, when you watch a video or make a video call, your device creates a session—a temporary connection with another server. If this session is interrupted, the entire connection breaks, and you must start over. TCP/IP wasnt designed to manage sessions, making it unreliable for modern apps and services that depend on continuous communication.
Another problem is the internets complexity. The way it works involves layers of technology stacked on top of each other—apps, storage systems, networks, and more. These layers often dont communicate efficiently, wasting resources and making everything slower, more expensive, and harder to fix. This complexity also makes the internet fragile, as small issues can cascade into larger failures.
Security is another area where TCP/IP falls short. It wasnt designed with cybersecurity in mind, which is why we rely on add-ons like firewalls, VPNs, and encryption. But these tools are essentially patches over a flawed system, and they add even more complexity, making the internet less robust and more vulnerable to attacks.
Modern services and devices have also outgrown the static design of TCP/IP. The system assumes that servers and devices stay in fixed locations, but todays internet is dynamic. Cloud services, mobile devices, and apps often move across networks. This static model creates inefficiencies and slows down the system.
Adding to the problem is the internets dependence on a few centralized services, such as Google, Amazon, and Microsoft. These companies control much of the infrastructure we rely on for communication, storage, and services. If one of them fails—or if access is blocked due to political conflicts—entire regions can lose critical internet functions. This centralization makes the system fragile and leaves users vulnerable.
> The stakes are high. The internet is essential for communication, education, business, and so much more. Yet its foundation is crumbling under modern demands. Without major changes, well see more frequent failures, slower services, and increased vulnerabilities. In extreme cases, parts of the internet could break entirely.
To fix this, we need a smarter, more resilient approach. Decentralized networks can distribute resources and reduce our dependence on a few central providers. Emerging technologies like RINA (Recursive Inter-Network Architecture) offer a simplified, more secure, and more efficient alternative to TCP/IP. These systems are designed to handle the needs of the modern internet, with built-in reliability, smarter communication, and security at their core.
> The bottom line is clear: the internets outdated foundation is holding us back. If we want the internet to remain reliable and serve future generations, we must address these issues now. A decentralized, secure, and modernized internet isnt just a technical upgrade—its a necessity for our connected world.
## Tech Brief
The following tech brief is aimed at experts.
### 1. **Lack of Session Management**
- **TCP/IPs Shortcomings**
- TCP/IP lacks true session management. A session represents an ongoing communication between two entities (e.g., a user browsing a website). If the connection is interrupted (e.g., due to a network outage or device change), the session is lost, and applications must restart or recover manually.
- This flaw creates inefficiencies in modern applications that require reliable, continuous communication, such as video calls, gaming, or IoT devices.
- **Why It Matters**
- Every time a session breaks, applications have to rebuild connections at a higher level (e.g., re-authenticate or restart a video call). This is inefficient and increases complexity, making the internet fragile and less resilient.
---
### 2. **Layer Violations**
- **The Problem**
- TCP/IP combines different functionalities into a single stack, leading to inefficiencies. For example:
- Routing decisions happen at the IP layer.
- Reliable data transfer happens at the TCP layer.
- However, these layers are not isolated and often interfere with each other, creating unnecessary overhead.
- **Impact**
- Modern networks require additional layers (e.g., firewalls, VPNs, NATs) to patch these issues, making the architecture increasingly complex and brittle.
---
### 3. **No Built-In Security**
- **TCP/IP Design Flaw**
- Security was not a priority when TCP/IP was designed. The protocols do not inherently protect against common threats like spoofing, hijacking, or denial of service.
- IPv6 introduces some improvements, such as built-in IPsec, but these are optional and often not used, leaving the same vulnerabilities.
- **Impact**
- Every modern application must implement its own security mechanisms (e.g., HTTPS, VPNs), leading to duplicated efforts and inconsistent protections.
---
### 4. **Scalability Issues**
- **IPv4 vs. IPv6**
- IPv4, with its 32-bit addressing, exhausted available addresses, leading to NAT (Network Address Translation) as a workaround. This introduced complexity and broke the end-to-end connectivity principle of the internet.
- IPv6, with 128-bit addressing, solves the address exhaustion problem but does not address underlying issues like routing table explosion or inefficiencies in the protocol stack.
- **Routing Problems**
- The lack of built-in session and naming management makes routing inefficient. Large routing tables and decentralized updates slow down the internet and make it harder to scale.
---
### 5. **No Support for Application-Centric Networking**
- **TCP/IPs Assumption**
- The protocol assumes communication happens between fixed endpoints (e.g., IP addresses). Modern applications, however, focus on data and services rather than specific endpoints. For example:
- Cloud applications may move across data centers.
- Mobile devices frequently change networks.
- TCP/IPs static model is incompatible with this dynamic, service-oriented world.
- **Impact**
- Workarounds like DNS (Domain Name System) and CDNs (Content Delivery Networks) add layers of complexity, but theyre still built on a flawed foundation.
---
### RINA: A Better Alternative
The **Recursive Inter-Network Architecture (RINA)** proposes a solution to the flaws of TCP/IP by rethinking the internet's architecture. Heres how RINA addresses these issues[^1]:
1. **Unified Layering**
- Unlike TCP/IP, which has rigid and distinct layers, RINA uses recursive layers. Each layer provides the same functionalities (e.g., routing, security, session management), simplifying the architecture.
2. **Built-In Session Management**
- RINA natively supports session management, ensuring continuity and reliability for modern applications, even in the face of interruptions.
3. **Application-Centric Networking:**
- RINA treats applications as first-class citizens, focusing on the services they need rather than rigid endpoint communication. This aligns with the dynamic nature of modern networks.
4. **Improved Security:**
- Security is integral to RINA, with mechanisms for authentication, confidentiality, and integrity built into every layer.
5. **Simplified Routing and Scaling:**
- RINA reduces the size and complexity of routing tables, making the network easier to scale and manage.
[^1]: [RINA Leaflet](https://www.open-root.eu/IMG/pdf/rina-leaflet_20191115_en.pdf)

View File

@@ -1,7 +0,0 @@
{
"label": "First Principle Thinking",
"position": 4,
"link": {
"type": "generated-index"
}
}

Binary file not shown.

Before

Width:  |  Height:  |  Size: 98 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 210 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 134 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 227 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 3.8 MiB

View File

@@ -1,7 +0,0 @@
{
"label": "The Solution \"Geo Aware\"",
"position": 3,
"link": {
"type": "generated-index"
}
}

View File

@@ -1,32 +0,0 @@
---
sidebar_position: 1
title: 'What is Geo Awareness'
hide_title: true
---
![](img/geo_aware.png)
## What is Geo Awareness
**Geo-awareness** ensures that digital systems operate with respect to geographic and physical realities. This concept radically shifts how we approach storage, computation, and networking by enabling location-centric control and efficiency. Here's what it entails:
#### Key Features of Geo-Awareness:
1. **Shortest Physical Path for Communication**
Communication between two parties happens through the shortest physical route, reducing latency and energy consumption while increasing efficiency.
2. **Data Sovereignty and Integrity**
Users can decide where their data is stored. The data remains incorruptible and accessible only to the user or their personal AI agent, ensuring data privacy and sovereignty.
3. **Resilient Internet Functionality**
Even in cases of internet outages or disasters, most apps and services remain operational, ensuring reliability and continuity.
4. **Control Over Applications and AI**
Geo-awareness enables users to decide where their applications and personal AI agents operate, giving them full control over their digital footprint and reducing external vulnerabilities.
5. **Transparent Deployment of Code**
Knowing exactly which code or app is deployed where ensures security and prevents tampering.
6. **Relevance for Nations and Public Infrastructure**
Unlike public blockchains that lack geo-awareness, this model empowers countries with localized control, enhancing sovereignty and trust.

Binary file not shown.

Before

Width:  |  Height:  |  Size: 792 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 884 KiB

View File

@@ -1,70 +0,0 @@
---
sidebar_position: 4
title: 'Solution For a Better Internet'
hide_title: true
---
![](img/geo_aware2.png)
## Geo Awareness is the Solution for Many of the Internet Problems
### The Problems
- [Compare Electricity](../internet_today/compare_electricity.md) - Compares the inefficiency of relying on distant internet infrastructure to the absurdity of using electricity generated on the other side of the world.
- [Internet Basics](../internet_today/internet_basics.md) - Explains the three fundamental layers of the internet: compute/AI/storage, network, and applications, highlighting current centralization issues.
- [Centralization Risk](../internet_today/centralization_risk.md) - Details the dangers of relying on centralized infrastructure and services, using real-world examples like the Ukraine conflict.
<<<<<<< HEAD
- [The Race For Intelligence](../internet_reinvented/aci.md) - Discusses how AI agents will replace traditional apps within 2 years and the implications of centralized AI development.
- [GDP Negative Impact](../internet_today/gdp_negative.md) - Reveals how the current internet structure causes economic losses for developing nations, with case studies showing billions in yearly losses.
- [Internet Protocol Is Broken](../first_principle_thinking/3_internet_risk.md) - Explains why TCP/IP's outdated design is inadequate for modern internet needs and explores RINA as a potential solution.
- [Painkillers Approach](../first_principle_thinking/1_onion_analogy.md) - Uses an onion analogy to illustrate how adding layers to internet infrastructure masks symptoms rather than solving core problems.
=======
- [GDP Negative Impact](../internet_today/gdp_negative.md) - Reveals how the current internet structure causes economic losses for developing nations, with case studies showing billions in yearly losses.
>>>>>>> f008746dae6f2bffedc655509c0c7acd4a6e7190
**The following table shows how the problems as listed above are fixed because of geo awareness.**
| **Problem Area** | **Web2** | **Web3** | **Web 0 = Geo-Aware** |
| ---------------------------------- | ----------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------ | --------------------------------------------------------------------------------------------- |
| **Centralization** | Dominated by a few corporations; creates fragility and dependency. | Often more Decentralized, but lacks local autonomy; often relies on centralized validators and still datacenters. | Fully decentralized and location-specific, empowering local infrastructure and sovereignty. |
| **Data Sovereignty** | Data stored in centralized data centers controlled by corporations. | Decentralized storage, but users often lack control over physical location. | Users choose specific locations for data storage, ensuring sovereignty and privacy. |
| **Infrastructure Resilience** | Vulnerable to disasters, geopolitical issues, and single points of failure. | Often less resilient compared to Web2. | Shortest physical paths and local redundancies ensure continued operation during disruptions. New paths are found when needed even by using nodes from your friends. |
| **Economic Impact (GDP Negative)** | High costs for infrastructure; revenue flows to global platforms. | The validators are still too centralized and often hosted in centralized datanceters. Too complicated and too early days to help right now. | Localized infrastructure boosts regional economies, keeping revenue within countries. |
| **Internet Efficiency** | Long data routes; underutilized hardware; inefficient layers. | Reliant on outdated protocols, vulnerable because of used ledger tech and layered inefficiencies. | Shortest paths reduce latency and cost; full hardware optimization ensures efficiency. |
| **Security and Transparency** | Complex, security by smart employees of the corporations. | Smart contracts improve security, but issues remain as code upgrade path. | Transparent and tamper-proof deployments ensure security and resilience. |
| **Layer Complexity** | Redundant layers create inefficiencies and fragility. | Often web3 is more complex compared to web 2. | Simplifies architecture by localizing compute, storage, and networking. 10x less development effort is possible |
| **Application Hosting** | Hosted in large centralized data centers, increasing latency and cost. | Sometimes, decentralized hosting but not geographically optimized. | Applications can be hosted locally, reducing latency and ensuring autonomy. |
| **Access Inequality** | Over 50% of the world lacks reliable access. | Expands access but without addressing local infrastructure challenges. | Geo-aware systems build localized, affordable infrastructure to improve access. |
| **Session Management** | Breaks under interruptions; no native continuity. | Some continuity improvements via decentralized protocols. | Built-in session management ensures reliability even during disruptions. |
## Challenges in the Current Depin (Decentralized Internet) World
Despite advancements in decentralized technology, geo-awareness remains under-prioritized.
Current Web3 solutions focus on decentralization without accounting for the geographic efficiency or sovereignty that geo-awareness offers.
---
## Comparison Table: Current Web3 Solutions vs. Geo-Aware Systems
| **Feature** | **Current Web3 Solutions** | **Geo-Awareness** |
| ----------------------- | ------------------------------------------------------- | -------------------------------------------------------- |
| **Storage** | Global, often randomly distributed without user control | Users choose storage locations; data remains sovereign |
| **Compute** | Decentralized but lacks location-specific optimization | Compute occurs at chosen locations; optimized for region |
| **Network** | Relies on global, non-optimized routing | Shortest physical path for communication |
| **Ledger** | Public blockchains are unreliable in case of network issues | Location-aware sovereign ledgers for national and local control |
| **Resilience** | Vulnerable to global internet disruptions | Independent operation during outages |
| **Application Control** | Limited transparency on app deployment locations and upgrade paths | Full control and visibility of app deployment |
| **Data Integrity** | Prone to distributed risks and complexities | Tamper-proof, user-controlled data access |
---
## Why Geo-Awareness Matters
The current centralized and globalized digital architecture exacerbates inefficiencies, compromises sovereignty, and creates economic dependencies. Geo-awareness addresses these problems by creating a decentralized yet location-sensitive framework. This ensures that infrastructure is resilient, secure, and operates in harmony with the physical realities of the world, ultimately empowering users and nations alike.

Binary file not shown.

Before

Width:  |  Height:  |  Size: 90 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 427 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 132 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 295 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 671 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 665 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 604 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 458 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 672 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 215 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 10 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 224 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 231 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 312 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 338 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 386 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 263 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 313 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 162 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 76 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 244 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 78 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 262 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 286 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 262 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 238 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.0 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 188 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 312 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 97 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 277 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 130 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 24 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.2 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 246 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 233 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 246 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 395 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 23 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 675 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.9 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 413 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 732 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 633 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 330 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 691 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.1 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 955 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.2 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.3 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 940 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 692 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.5 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 610 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 84 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 121 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 710 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 541 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 772 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 436 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 104 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 122 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 175 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 124 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 371 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 304 KiB

Some files were not shown because too many files have changed in this diff Show More