This commit is contained in:
despiegk 2025-01-19 20:50:14 +01:00
parent 7c0d26b62c
commit 224b85a398
45 changed files with 70 additions and 157 deletions

View File

@ -2,7 +2,6 @@
title: 'Compare'
sidebar_position: 30
description: The computer layer compared.
hide_title: true
---
@ -21,9 +20,3 @@ hide_title: true
> We do not compare our system with those that claim to be full cloud solutions but merely deploy containers using other management systems and optionally connect to a blockchain for billing purposes. Nor do we compare with marketplace systems that simply act as frontends for other systems. We believe these systems, while visually impressive, lack substantial technological foundations and cannot serve as a fundamental base layer for others.
**Security and Simplicity:**
Zero-OS provides a Autonomous Decentralized Cloud.
This not only blocks hacker access but also eliminates human error, enhancing both security and reliability.

View File

Before

Width:  |  Height:  |  Size: 70 KiB

After

Width:  |  Height:  |  Size: 70 KiB

View File

Before

Width:  |  Height:  |  Size: 233 KiB

After

Width:  |  Height:  |  Size: 233 KiB

View File

Before

Width:  |  Height:  |  Size: 142 KiB

After

Width:  |  Height:  |  Size: 142 KiB

View File

Before

Width:  |  Height:  |  Size: 481 KiB

After

Width:  |  Height:  |  Size: 481 KiB

View File

Before

Width:  |  Height:  |  Size: 134 KiB

After

Width:  |  Height:  |  Size: 134 KiB

View File

Before

Width:  |  Height:  |  Size: 307 KiB

After

Width:  |  Height:  |  Size: 307 KiB

View File

@ -60,24 +60,6 @@ Default features:
- The containers can use a web gateway to allow internet users to connect to the applications which are running in their secure containers
- Can use core-x to manage the workload
| | Zos Compute Layer Benefits | Default |
|----------------|--------------------------------------------------------------------------------|------------------------------------------------------------------|
| Management | Full P2P, done by 3bot Agents, blockchain IT contract | Centralized e.g. Kubernetes, ... |
| OS Deploy | Stateless, there are no files copied on local HDD/SSD. | Deploy image or execute installer on a physical server |
| OS Upgrade | Seamless, rolling upgrades, 100% modular and pre-deterministic, decentralized | Difficult and error prone + vulnerable from security perspective |
| Tamperproof | If file gets modified Zero-OS will not boot the file. | No, man in middle is possible. |
| Scalability | To the world | Expensive and depending on lots of capital |
| Security | A lot of effort went into the capability to deploy for high security usecases. | Very hard to deploy securely, and expensive |
| Green | For certain workloads we can safe upto 10x on power usage | Super power hungry. |
| Liquid Cooling | Easy to do because of autonomous behavior no need to replace HW. | Hard to do, how to do maintenance. |
| Sovereign | Yes | Mostly not. |
| Complexity | Anyone can do it, we made it to allow everyone to be a provider. | Real experts needed. |
> We do not compare our system with those that claim to be full cloud solutions but merely deploy containers using other management systems and optionally connect to a blockchain for billing purposes. Nor do we compare with marketplace systems that simply act as frontends for other systems. We believe these systems, while visually impressive, lack substantial technological foundations and cannot serve as a fundamental base layer for others.
**Security and Simplicity:**
Zero-OS provides a Autonomous Decentralized Cloud.

View File

@ -6,7 +6,7 @@ sidebar_position: 20
Below are some of the ways in which we achieve energy efficiency as compared to traditional models.
![alt text](../img/energy_efficient.png)
![](img/energy_efficiency.png)
In addition, a decentralized peer-to-peer infrastructure which finds the shortest path between end points is by nature energy-efficient. Data needs to travel a much shorter distance.

Binary file not shown.

After

Width:  |  Height:  |  Size: 171 KiB

View File

@ -1,9 +1,8 @@
---
title: Compare
sidebar_position: 10
sidebar_position: 20
---
# Network Layer
| | ThreeFold Network Layer | Other Overlay Network Technologies (like VPN) |
|-----------------------------|-----------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------|

View File

Before

Width:  |  Height:  |  Size: 116 KiB

After

Width:  |  Height:  |  Size: 116 KiB

View File

Before

Width:  |  Height:  |  Size: 106 KiB

After

Width:  |  Height:  |  Size: 106 KiB

View File

Before

Width:  |  Height:  |  Size: 260 KiB

After

Width:  |  Height:  |  Size: 260 KiB

View File

@ -6,18 +6,15 @@ sidebar_position: 2
# Mycelium: Our Planetary Network
![alt text](../../img/mycelium.png)
![](img/mycelium_overview.png)
The planetary network called Mycelium is an overlay network which lives on top of the existing Internet or other peer-to-peer networks created.
In the Mycelium network, everyone is connected to everyone. End-to-end encryption between users of an app and the app runs behind the network wall.
!!wiki.include page:'tech:mycelium0.md'
## Mycelium: A New Network Layer for the Internet
![](../../img/mycelium00.png)
### The Problem
The current centralized state of the internet poses significant security risks, with compromised routers and growing cyber threats (trillions of USD per year now), making everyone vulnerable to hacking. Industry responses involve disabling original features, hindering true peer-to-peer connectivity and personal server capabilities. Workarounds and system hacks have become the norm.

View File

@ -1,5 +1,6 @@
---
sidebar_position: 1
title: 'Overview'
---
@ -11,16 +12,12 @@ Our decentralized networking platform allows any compute and storage workload to
ZNet is the foundation of any architecture running on the TF Grid. It can be seen as a virtual private data center and the network allows all of the *N* containers to connect to all of the *(N-1)* other containers. Any network connection is a secure network connection between your containers, it creates a peer-to-peer network between containers.
![alt text](../../img/net1.png)
No connection is made with the Internet. The ZNet is a single tenant network and by default not connected to the public Internet. Everything stays private. For connecting to the public Internet, a Web Gateway is included in the product to allow for public access, if and when required.
### Redundancy
As integrated with Web Gateway
![alt text](../../img/net2.png)
- Any app can get (securely) connected to the Internet by any chosen IP address made available by ThreeFold network farmers through WebW
- An app can be connected to multiple web gateways at once, the DNS round robin principle will provide load balancing and redundancy
- An easy clustering mechanism where web gateways and nodes can be lost and the public service will still be up and running
@ -28,7 +25,6 @@ As integrated with Web Gateway
### Network Wall
![](../../img/network_wall.png)
For OEM projects we can implement a cloud deployment without using TCP-IP or Ethernet this can lead to super secure environments, ideal to battle the Cuber Pandemic.

View File

@ -7,8 +7,6 @@ title: Web Gateway
The Web Gateway is a mechanism to connect private networks to the open Internet in such a way that there is no direct connection between the Internet and the secure workloads running in the Zero VMs.
![](../../img/webgateway.jpg)
### Key Benefits
- Separation between where compute workloads are and where services are exposed

View File

@ -1,16 +0,0 @@
---
sidebar_position: 2
title: Mycelium
description: Our Planetary Network
---
# Mycelium: Our Planetary Network
![alt text](../../img/mycelium.png)
The planetary network called Mycelium is an overlay network which lives on top of the existing Internet or other peer-to-peer networks created.
In the Mycelium network, everyone is connected to everyone. End-to-end encryption between users of an app and the app runs behind the network wall.
!!wiki.include page:'tech:mycelium0.md'

View File

@ -2,11 +2,11 @@
sidebar_position: 1
---
# Quantum Safe Storage System
# Unbreakable Storage
Our storage architecture follows the true peer2peer design of the cecentralized cloud system.
![](../../img/qsss_intro2.png)
![](img/unbreakable_storage.png)
Any participating node only stores small incomplete parts of objects (files, photos, movies, databases etc.) by offering a slice of the present (local) storage devices. Managing the storage and retrieval of all of these distributed fragments is done by a software that creates development or end-user interfaces for this storage algorithm. We call this '**dispersed storage**'.
@ -18,12 +18,6 @@ Any participating node only stores small incomplete parts of objects (files, pho
- Datarot is detected and fixed.
- There is 100% contorl over where data is (GDPR)
## Architecture
![](../../img/storage_arch.png)
The cloud user can mix and match storage technologies as are required for their application.
## Peer2Peer Advantages
Peer2peer provides the unique proposition of selecting storage providers that match your application and service of business criteria. For example, you might be looking to store data for your application in a certain geographic area (for governance and compliance) reasons. You might also want to use different "storage policies" for different types of data. Examples are live versus archived data. All of these uses cases are possible with this storage architecture, and could be built by using the same building slice produced by farmers and consumed by developers or end-users.

View File

@ -1,16 +1,14 @@
---
title: Storage Layer
sidebar_position: 1
title: Compare
sidebar_position: 20
description: 'compare how its dont in other overlay network systems.'
---
![](../../img/storage_inno.png)
# Storage
| | ThreeFold Storage Layer | Overlay Storage Systems |
|-----------------------------|------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------|
| Quantum Safe | Yes, novel encoding system (not encryption based) makes impossible to hack data. | No |
| Unbreakable | Yes, novel encoding system (not encryption based) makes impossible to hack data. | No |
| Post Quantum | Possible (ask us) | No |
| Scalability | Yes, this system exists +10 years, is being used by large orgs for zetabytes. | Some systems, most not, but centralized. |
| Compatibility | Yes thanks to filesystem approach | Depends, often not |

View File

@ -1,19 +1,44 @@
---
sidebar_position: 5
title: File System
sidebar_position: 2
---
# Quantum Safe Filesystem
### The Problem
Our quantum safe filesystem technology has unique features.
There is a growing need for more accessible and user-friendly solutions to store and manage large volumes of data efficiently.
While Zero-Stor addresses numerous storage challenges effectively, it may not be accessible or user-friendly for typical developers or system administrators. QSFS has been developed to bridge this gap and provide a more approachable storage solution.
### Introducing QSFS
A filesystem utilizing Zero-Stor as its backend. Metadata is safeguarded to prevent loss, inheriting Zero-Stor's benefits and simplifying usage for developers and system administrators.
The filesystem is always deployed in one location, data is distributed (using zero-stor) across multiple sites for unparalleled reliability.
Metadata redundancy is included. While not consistently synchronized in real-time, the system allows configuration of consistency levels. Typically, the decentralized state may lag by up to 15 minutes.
This filesystem can be mounted under various storage-aware applications, such as backup servers, file servers, or S3 servers, enhancing versatility.
### Benefits
- Inherits the advantages of Zero-Stor, including enhanced data security, efficiency, and scalability.
- Provides a user-friendly interface for seamless integration with a wide range of applications.
- Offers considerable scalability capabilities, although not unlimited in scale.
- Achieves reasonable performance data transfer rates of up to 50 MB/sec, particularly for larger files.
- Can scale to about 2 million files per filesystem.
## Details
Our Unbreakable filesystem technology has unique features.
![](../../img/qss_fs_arch.png)
A redundant filesystem, can store PB's (millions of gigabytes) of information.
Unique features:
- Unlimited scalability (many petabytes)
- Quantum Safe:
- Unbreakable:
- No farmer knows what the data is
- Even a quantum computer cannot decrypt the data
- Data can't be lost
@ -30,7 +55,7 @@ Unique features:
- Read-write caching on encoding node (the front end)
## Mount Any Files In Your Storage Infrastructure
### Mount Any Files In Your Storage Infrastructure
The QSFS is a mechanism to mount any file system (in any format) on the grid, in a quantum secure way.
@ -56,12 +81,9 @@ This concept scales forever, and you can bring any file system on top of it:
- IPFS and Hypercore distributed file sharing protocols
## Architecture
### Architecture
By using our filesystem inside a Virtual Machine or Kubernetes, the cloud user can deploy any storage application on top e.g. Minio for S3 storage, OwnCloud as online fileserver.
![](../../img/qsstorage_architecture.jpg)
Any storage workload can be deployed on top of the zstor.
Any storage workload can be deployed on top of Unbreakable Storage System.

View File

@ -1,10 +1,10 @@
---
sidebar_position: 2
sidebar_position: 3
---
# Quantum Safe Storage Algoritm
# Algoritm
The Quantum Safe Storage Algorithm is the heart of the Storage engine. The storage engine takes the original data objects and creates data part descriptions that it stores over many virtual storage devices (ZDB/s).
The UnbreakableStorage Algorithm is the heart of the Storage engine. The storage engine takes the original data objects and creates data part descriptions that it stores over many virtual storage devices (ZDB/s).
Data gets stored over multiple ZDB's in such a way that data can never be lost.
@ -28,7 +28,7 @@ The solution is not based on replication or sharding, the algo represents the da
## How Data Is Stored Today
![alt text](../../img/storage_today.png)
![](img/storage_old.png)
In most distributed systems, as used on the Internet or in blockchain today, the data will get replicated (sometimes after sharding, which means distributed based on the content of the file and spread out over the world).
@ -36,9 +36,9 @@ This leads to a lot of overhead and minimal control where the data is.
In well optimized systems overhead will be 400% but in some it can be orders of magnitude higher to get to a reasonable redundancy level.
## The Quantum Safe Storage System Works Differently
## The UnbreakableStorage System Works Differently
![alt text](../../img/qsss_overview.png)
![](img/unbreakable2.png)
We have developed a new storage algorithm which is more efficient, ultra reliable and gives you full control over where your data is stored.
@ -108,7 +108,7 @@ If someone now wants to download the data, the first 10 locations to answer will
The overhead here is more, compared to previous example, but stil orders of magnitude lower compared to other CDN systems.
## The Quantum Safe Storage System Can Avoid Datarot
## The UnbreakableStorage System Can Avoid Datarot
Datarot is the fact that data storage degrades over time and becomes unreadable e.g. on a harddisk.

View File

@ -1,6 +1,6 @@
---
title: FungiStor
sidebar_position: 4
sidebar_position: 19
---
## FungiStor (H2 2025)

View File

Before

Width:  |  Height:  |  Size: 104 KiB

After

Width:  |  Height:  |  Size: 104 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 169 KiB

View File

Before

Width:  |  Height:  |  Size: 271 KiB

After

Width:  |  Height:  |  Size: 271 KiB

View File

Before

Width:  |  Height:  |  Size: 569 KiB

After

Width:  |  Height:  |  Size: 569 KiB

View File

@ -1,14 +1,11 @@
---
sidebar_position: 4
sidebar_position: 18
title: NFT Storage
---
# Unbreakable Storage System for NFT
# Quantum Safe Storage System for NFT
Our technology enables quantum safe storage for NFT.
![](../../img/nft_architecture_updated.png)
Our technology enables Unbreakable storage for NFT.
The owner of the NFT can upload the data using one of our supported interfaces:
@ -63,7 +60,7 @@ Any corruption e.g. bitrot gets automatically detected and corrected.
In case of a HD crash or storage node crash the data will automatically be expanded again to fit the chosen redundancy policy.
#### The Storage Algoritm Uses Quantum Safe Storage System As Its Base
#### The Storage Algoritm Uses Unbreakable Storage System As Its Base
Not even a quantum computer can hack data stored on our QSSS.

View File

@ -0,0 +1,13 @@
---
sidebar_position: 3
title: Zero Knowledge Proof
---
# Zero Knowledge Proof Storage System
The Unbreakable Storage System is zero knowledge proof compliant. The storage system is made up of / split into 2 components: the actual storage devices use to store the data (ZDB's) and the Unbreakable Storage engine.
The zero proof knowledge compliancy comes from the fact that all of the physical storage nodes (3Nodes) can prove that they store a valid part of the data that the Unbreakable storage engine (QSSE) has stored on multiple independent devices. The QSSE can validate that all of the QSSE storage devices have a valid part of the original information. The storage devices however have no idea what the original stored data is as they only have a part (description) of the original data and have no access to the original data part or the complete original data objects.

Binary file not shown.

Before

Width:  |  Height:  |  Size: 140 KiB

View File

@ -1,32 +0,0 @@
---
title: Quantum Safe Storage
sidebar_position: 2
---
## Quantum Safe File System
### The Problem
There is a growing need for more accessible and user-friendly solutions to store and manage large volumes of data efficiently.
While Zero-Stor addresses numerous storage challenges effectively, it may not be accessible or user-friendly for typical developers or system administrators. QSFS has been developed to bridge this gap and provide a more approachable storage solution.
### Introducing QSFS
A filesystem utilizing Zero-Stor as its backend. Metadata is safeguarded to prevent loss, inheriting Zero-Stor's benefits and simplifying usage for developers and system administrators.
The filesystem is always deployed in one location, data is distributed (using zero-stor) across multiple sites for unparalleled reliability.
Metadata redundancy is included. While not consistently synchronized in real-time, the system allows configuration of consistency levels. Typically, the decentralized state may lag by up to 15 minutes.
This filesystem can be mounted under various storage-aware applications, such as backup servers, file servers, or S3 servers, enhancing versatility.
### Benefits
- Inherits the advantages of Zero-Stor, including enhanced data security, efficiency, and scalability.
- Provides a user-friendly interface for seamless integration with a wide range of applications.
- Offers considerable scalability capabilities, although not unlimited in scale.
- Achieves reasonable performance data transfer rates of up to 50 MB/sec, particularly for larger files.
- Can scale to about 2 million files per filesystem.

View File

@ -1,15 +0,0 @@
---
sidebar_position: 3
title: Zero Knowledge Proof
---
# Zero Knowledge Proof Storage System
The Quantum Safe Storage System is zero knowledge proof compliant. The storage system is made up of / split into 2 components: the actual storage devices use to store the data (ZDB's) and the Quantum Safe Storage engine.
![](../../img/qss_system.jpg)
The zero proof knowledge compliancy comes from the fact that all of the physical storage nodes (3Nodes) can prove that they store a valid part of the data that the quantum safe storage engine (QSSE) has stored on multiple independent devices. The QSSE can validate that all of the QSSE storage devices have a valid part of the original information. The storage devices however have no idea what the original stored data is as they only have a part (description) of the original data and have no access to the original data part or the complete original data objects.

View File

@ -1,13 +0,0 @@
---
title: Quantum Safe Filesystem
sidebar_position: 3
---
## Zero-Stor : An Unbreakable Backend Storage System
Zeros-Stor is a quantum safe backend storage system that use efficient algorithms to ensure maximal use of storage.
![](../../img/qsss.png)
!!wiki.include page:zstor_innovation_short