SENTINEL GROUP : TO THE RESCUE

in sentrix •  7 years ago  (edited)

SENTINEL GROUP : TO BREAK THE FIREWALL OF CHINA 8: 22am
Coin Specs

2 B Total
75% ICO
20% Dev
5% Bounty

ICO Price: $0.0013
The team consists of over 25 persons outputting over 300 hours work week,there are already 500 commits

Due to scalability,TenderMint was chosen as their consensus mechanism
The Sentinel Service Chain is the first interoperable networking layer to communicate between multiple chains for identity validation, service offering along with bandwidth sharing and incentivization.

The distributed and decentralized services marketplace is huge and Sentinel is targeting a key resource that will drive this innovation — networking. This system has a payment governance system with Unpaid/Paid/Hold blocks for multiple forms of payment (Post Paid, Pre-Paid and Recurring)

The entire network monitoring and payment system is being offered as an SDK that can be directly implemented in various apps developed by multiple organizations around the world.

Currently, we have a lot of features coming up:
dChat
dVoIP
centralized on-chain swaps
Exit Nodes with entry into TOR
Packet Standardization
TenderMint Integration
This not only means that Sentinel will be a dVPN product, but an entire communication suite in the form of dChat and dVoIP will be developed and integrated with the Sentinel Desktop & Mobile Clients in future.

https://medium.com/@Panama_TJ/sentinel-security-group-q-a-d085d49767ac
https://blog.mozilla.org/internetcitizen/2017/08/29/do-you-need-a-vpn/

What is a VPN
It is a secure connection between your computer and a server
From web browsing to communication to business activities, you need a secure connection

Why do we need VPN
A VPN can hide those footprints from prying eyes and add an extra layer of security against hackers.
Even if you don't think you're being tracked online, you are.

Your internet service provider (ISP) can see everything you do. While there probably isn't a guy at Time Warner Cable sitting in a corner office watching your every move, many ISPs do compile anonymous browsing logs and sometimes sell them to advertising companies. With that data, advertisers can tailor their content directly to certain regions or browsing habits.

How does a VPN work?
When you connect to a VPN, you create a secure, encrypted tunnel between your computer and the VPN remote server. The data is essentially gibberish to anyone who intercepts it. Your ISP, government or hackers won’t know which websites you visit. And conversely, the websites you visit won’t know where you are. Typically, logging in to a VPN is as easy as entering a password and clicking a button on a VPN client

PAINPOINTS
As many as one quarter of internet users around the world use VPNs, according to a survey from Global Web Index.

Right now there's definite cause for concern. Last March, the Senate voted to permit internet providers to sell customers' browsing history without their knowledge or approval. Then in November, the FCC scrapped Obama-era net neutrality regulations, giving ISPs even broader control over the data traveling over their networks.

Are VPNs truly private?
Unfortunately, no. The VPN provider can still log your browsing data. You are essentially putting your trust in your VPN provider. Will your provider hand over info when pressed? Will they log your browser data and sell it at a later date?
ManyVPN providers are trustworthy and vow to keep customer info private, but some are downright nefarious. Researchers recently tested 300 free VPN apps on Google Play and found that nearly 40 percent installed malware or malvertising on users’ machines. (NPR has a brilliant article about VPNs and privacy here.) The lesson? Pick a VPN provider you can really trust.
Also realize that there are things beyond your VPN provider’s control. If you live under a repressive regime a VPN might not let you tunnel under restrictions to access blocked sites.

How do you pick a VPN provider?
It may be tempting to turn to a free VPN provider, but many simply don’t deliver a great experience. Some sell your data (anonymized) to advertisers in order to survive. Other VPN services run ads. Some may be free and secure, but are painfully slow.
It can also be tricky to pick a good paid VPN service. For example, a provider may offer secure connections and ultimate privacy, but a limited number of server locations. Your browsing data may not be as anonymized as you’d like.
Here are some questions you should ask when considering a VPN provider:
What kind of data, if any, does the VPN provider collect about your browsing?
How long does it keep this data?
Are there any restrictions?
Where are the VPN servers?
How do you pay for the VPN service?
That last question can be really tricky. If you pay for the VPN service with credit card or PayPal, how private will it be? If you’re after ultimate privacy and security, look for a service that accepts payment from anonymous services like Bitcoin.

SENTINEL ARCHITECTURE
---- it is multi chain
--- AUID(anonymous User ID) is created add stored in an independent chain which interacts with other chains to provide access to the services on the service chain and for the payment processing on the transaction chain
--- Service chain: here one can access data via relay and exit nodes through Sentinel tokens
--- Sentinel Transactions Chain - Payments and related processing of transactions from and to the Sentinel Transaction Pool

Identity Chain & Anonymous User ID (AUID)
It is the only way to access all services on the network

Each activity affects your reputation. The system is governed by reputation. It determines access to services and masternodes and affects your earning potential

AUID doesn't store any information unless needed and provided by the Users themselves.

These ID’s are distributed across the network to avoid single point of failure

The distributed consensus mechanism of the network quickly and effectively recognizes compromised ID’s. Auto mitigation solutions will kick in to make the network isn’t affected

Efficient Application specific identity management

Sentinel Service Chain
1.Sentinel security suite
---- dVPN{decentralized virtual private network} consisting of nodes that spans across the globe and in forms like PC, mobile phone or even server on the cloud
NB: current Sentinel dVPN is only a proof of concept and it is still been developed
2.Sentrix : it is the answer to the centralized communication powers{google,facebook etc}
What does Sentrix comprise of?

dChat
dVoIP

Sentrix will operate without a DNS and thereby is completely decentralized, operating only in a peer-to-peer fashion with utmost security using Ratchet Algorithms like OLM and MegOLM & more.
The lifetime of a message on sentrix is finite,however you could choose it if you will

Sentinel is developing a relay network where participants in the network can choose to be a relay or an exit node on which encrypted tunnels traffic between the VPN paid user and an exit node.

Future Development Plan
Layer-2 TOR Nodes and Master Nodes
Centralized on-chain Swaps
Packet Standardization across the Sentinel Network
Anonymous Mixer
Decentralized Chat/Messaging System (dChat)
Decentralized VoIP/Calling (dVoIP)
Resource Incentivization Protocol to incentivize Bandwidth, Storage and Computing
Hardware Boxes for Secure Access to multiple devices

COMPETITORS
Sentinel is very different from Mysterium, Privatix etc. You can use VPN services on Sentinel and you can also use many useful service such as dChat, dVOIP, dDNS, etc. These services are all available in Sentinel's Network layer. We will realease a software development kit for developers very soon so that other people can also make useful services for our network. We can use Sentinel dVPN with these services to make sure the service is fully secure and anonymous.

Sentinel was to help with a dDNS(decentralized Domain name system) and also dCDN(decentralized content delivery network)
It also plans to implement a dCLOUD, a decentralized version of Amazon web service

NB: they just had an airdrop where 5000 tokens were given out to each participate

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!