From 50126bb1fb6a035da034224da15e2eed252637d5 Mon Sep 17 00:00:00 2001 From: gitsrc <34047788+gitsrc@users.noreply.github.com> Date: Sun, 9 Jun 2024 22:06:01 +0800 Subject: [PATCH] feat(doc):update doc Signed-off-by: gitsrc <34047788+gitsrc@users.noreply.github.com> --- README.md | 89 ++++++++++++++++++++++++++++++++++--------------------- 1 file changed, 55 insertions(+), 34 deletions(-) diff --git a/README.md b/README.md index 4935f71..664ebaf 100644 --- a/README.md +++ b/README.md @@ -1,85 +1,106 @@
- +
- - - Build a global web3 decentralized private retrieval of data security network,Building Cyber Sovereignty. + + Build a global web3 decentralized private retrieval of data security network, Building Cyber Sovereignty.
-# Our mission +# Our Mission -In the field of new generation network security communications, the FlowShield project is leading a revolution. With the rapid development of the digital age, we are facing more and more network security threats and privacy issues. Traditional secure communications solutions are no longer able to meet the growing demands, so we need an innovative approach to protect our communications and data. +In the realm of next-generation network security communications, the FlowShield project is spearheading a revolution. As the digital age advances rapidly, we face increasing network security threats and privacy issues. Traditional secure communications solutions can no longer meet the growing demands, necessitating an innovative approach to protect our communications and data. -FlowShield adopts a series of cutting-edge technologies, such as blockchain, encryption algorithms and secure network architecture, to provide a strong guarantee for the new generation of network secure communication. Through decentralized design, FlowShield breaks the traditional centralized model and makes communication more secure and reliable. Each participant can jointly build and maintain this network, contributing to the security of the entire ecosystem. +FlowShield employs cutting-edge technologies, such as blockchain, advanced encryption algorithms, and secure network architecture, to provide robust guarantees for next-generation network secure communication. By adopting a decentralized design, FlowShield transcends the traditional centralized model, enhancing communication security and reliability. Each participant plays a role in building and maintaining this network, contributing to the security of the entire ecosystem.- +
-FlowShield not only focuses on data encryption and transmission security, but also on privacy protection. The project is committed to protecting the personal privacy of users and preventing their sensitive information from being misused or leaked. Through an anonymized and decentralized approach, FlowShield ensures that users’ identities and communication content are protected to the greatest extent possible, allowing them to have greater autonomy and control in the digital world. +FlowShield not only emphasizes data encryption and transmission security but also prioritizes privacy protection. The project is dedicated to safeguarding users' personal privacy, preventing misuse or leakage of sensitive information. Through anonymized and decentralized approaches, FlowShield ensures the utmost protection of users' identities and communication content, granting them greater autonomy and control in the digital world. + +# Components -# I. Dao Node +## I. DAO Node -Fullnode is a node open to everyone to participate. It carries the metadata of the distributed network and provides a metadata network and transaction matching platform. Fullnode ensures the online status of providers by integrating the metadata of individual providers and maintaining a heartbeat connection with the provider using the libp2p-based pubsub protocol. Users can use Fullnode to find resources and nodes, build their own secure and anonymous network tunnels, and be rewarded by paying tokens to provider nodes. At the same time, Fullnode uses Filecoin's web3.storage technology to store user and Dao data in a distributed manner to ensure data security and reliability. +Fullnode is accessible to everyone for participation. It carries the metadata of the distributed network and provides a metadata network and transaction matching platform. Fullnode ensures the online status of providers by integrating their metadata and maintaining a heartbeat connection using the libp2p-based pubsub protocol. Users can leverage Fullnode to find resources and nodes, build their secure and anonymous network tunnels, and receive rewards by paying tokens to provider nodes. Fullnode also uses Filecoin's web3.storage technology to store user and DAO data in a distributed manner, ensuring data security and reliability.- +
-# II. Network Provider +## II. Network Provider -Network provider nodes are automatically networked through the IPFS network of kademlia DHT and libp2p, and use peer discovery and routing functions to achieve fast communication and data synchronization. Using the PubSub function of libp2p, data can be efficiently published and subscribed between multiple nodes. +Network provider nodes are automatically networked through the IPFS network of Kademlia DHT and libp2p, utilizing peer discovery and routing functions for fast communication and data synchronization. Using the PubSub function of libp2p, data can be efficiently published and subscribed to between multiple nodes.- +
-# III. Smart Contracts +## III. Smart Contracts + +We provide comprehensive smart contracts for the decentralized trusted bandwidth market. Our smart contracts are deployed on the EVM network, offering numerous methods to ensure a secure trading process and environment. -We provide a complete smart contract for the decentralized trusted bandwidth market. Our smart contract is deployed on the EVM network, and we provide many methods in the smart contract to ensure a safe trading process and a safe trading environment.- +
-# IV. Network Verifier +## IV. Network Verifier -We provide the validator component of a decentralized trusted bandwidth marketplace. Validators can monitor the network quality of orders, detect and punish bad network providers, and ensure the fairness, reliability and security of transactions. We are committed to building a healthy and developing market that allows users to participate with confidence and enjoy high-quality bandwidth services. +The validator component of our decentralized trusted bandwidth marketplace monitors network quality, detects and penalizes malicious network providers, and ensures the fairness, reliability, and security of transactions. Our commitment is to build a healthy and thriving market, allowing users to participate with confidence and enjoy high-quality bandwidth services.- +
-# V. DeCA +## V. DeCA -DeCA decentralizes the PKI infrastructure and provides point-to-point communication identity and authentication capabilities for each node in the network. It implements autonomous identity control and provides simple and powerful PKI control capabilities. Through decentralized authentication and key management, DeCA ensures the confidentiality and integrity of communications. FlowShield network participants have autonomous control over their online identities and receive higher levels of authentication and encryption protection. Build a trusted point-to-point communication network through DeCA, improve the security of data and communication, and enhance the reliability and security of the FlowShield network. +DeCA decentralizes the PKI infrastructure, providing point-to-point communication identity and authentication capabilities for each network node. It implements autonomous identity control and offers simple yet powerful PKI control capabilities. Through decentralized authentication and key management, DeCA ensures the confidentiality and integrity of communications. FlowShield network participants have autonomous control over their online identities, receiving enhanced authentication and encryption protection. Build a trusted point-to-point communication network through DeCA to improve data and communication security, and enhance the reliability and security of the FlowShield network.- +
### [More documentation on DeCA](https://www.flowshield.xyz/flowshield_docs/cloudslit/deca/architecture/) -# VI. Access Client +## VI. Access Client -The client user establishes a connection with the provider through network access and establishes a secure network tunnel for retrieval of private data. Ensure the security and privacy of data transmission through authentication and encryption technologies. +The client user establishes a connection with the provider through network access, creating a secure network tunnel for private data retrieval. Authentication and encryption technologies ensure the security and privacy of data transmission.- +
+# Future Upgrades + +### I. Decentralized Network Support + +We plan to integrate support for decentralized network NATS, enabling robust and scalable real-time messaging. + +### II. DPKI Infrastructure Upgrade + +Enhancements to our Decentralized Public Key Infrastructure (DPKI) to provide even more secure and efficient key management. + +### III. Integration with Decentralized Immutable Database + +Nodes will incorporate decentralized immutable databases to ensure data integrity and tamper resistance. + +### IV. WASM Compute Capabilities + +DAO and miner nodes will be enhanced with WebAssembly (WASM) compute capabilities, facilitating more efficient and versatile computation. + # Disclaimers -When you use this software, you have agreed and declared that the author, maintainer and contributor of this software will not be responsible for any risks, costs or problems you encounter. If you find software defects or bugs, please submit patches to help improve! -# Ecological partners +By using this software, you agree and declare that the author, maintainer, and contributor of this software will not be responsible for any risks, costs, or problems you encounter. If you find software defects or bugs, please submit patches to help improve! + +# Ecological Partners -Protocol Labs |
Filecoin |
- FVM |
- Nervos |
- libp2p |
+ FVM |
+ Nervos |
+ libp2p |