CONET PROJECT
Launch CONETSilent Pass VPN
  • Welcome To CONET
    • Introduction
    • Background
      • Personal Information
        • Collection Of Personal Information
        • New Business Opportunities
          • AI
          • CLOUD COMPUTING
          • SEARCH ENGINE
          • BLOCKCHAIN
      • Decentralized Physical Infrastructure Network
    • CONET Manifesto
    • CONET Philosophy
  • Core Technology
    • How CoNET Works: Decentralized, Private, and Secure
    • Wallet-to-Wallet encrypted network communication protocol
      • Internet Protocol
        • TCP/IP Protocol
        • Internet TCP/IP Communication Privacy Threats
        • Internet Privacy Communication Solutions
      • Layer Minus Protocol
        • Layer Minus
        • Privacy Threats of the Layer Minus Protocol
    • CONET Platform
      • CONET Wallet
    • CONET Power Card
  • CoNET DePIN Blockchain
  • Staking
  • Nodes
    • Node Benefits for Guardians and CoNETian NFT
  • Silent Pass Proxy/VPN
    • B2B and B2C Solution
    • VPN vs Proxy
    • Silent Pass CDN
  • RPC
  • Tokenomics
    • Token Economic Model
    • Utilities and Economic
    • CONET Consensus Protocol
    • Token Distribution
    • Community-Driven Vision for Web3
  • Early Access Plans
    • Guardian Plan
      • Guardian Plan V2
    • The Conetian Plan
  • Community Incentive Program
    • The CoNETian Minigame
  • Road Map
  • Resource
  • CoNET DePIN Uniswap v4 Deployments
  • CoNET Decentralized Bridge
Powered by GitBook
On this page

Was this helpful?

Edit on GitHub
  1. Core Technology
  2. Wallet-to-Wallet encrypted network communication protocol
  3. Layer Minus Protocol

Layer Minus

Last updated 1 year ago

Was this helpful?

Layer Minus Protocol in CONET

The Layer Minus protocol establishes a network protocol for peer-to-peer communication, using wallet addresses as unique identifiers to distinguish devices from each other. This protocol outlines how data should be encapsulated, addressed, transmitted, routed, and received at its destination in a peer-to-peer communication network. The use of wallet addresses as unique identifiers ensures a secure and efficient means of communication within the CONET ecosystem.

Asymmetric Cryptography:

Cryptography encompasses the following elements:

Confidentiality: Ensures that messages can only be accessed by authorized parties. Integrity: Detects whether messages have been tampered with. Authentication: Both the sender and receiver need to verify their identities. Non-Reputation: Provides proof of transactions between message sender and receiver.

Asymmetric Cryptography is a cryptographic technique in which each user possesses a pair of keys:

Public Key:

Used to encrypt messages. Private Key: Used to decrypt messages encrypted with the public key. The private key is a randomly generated string of approximately fifty alphanumeric characters with no fixed logic or pattern. The private and public keys are generated as a pair by a computation process, ensuring uniqueness and non-repetition.

Wallet Address:

A wallet address is derived from the public key through specific HASH calculations and encoding in asymmetric encryption. Before using the CONET network, users need to create their public-private key pair and wallet address to distinguish their position on CONET. Wallet addresses are created on-demand by users and do not have a centralized allocation mechanism.

Public Key Encryption:

In a public key encryption system, anyone with the public key can encrypt a message, generating ciphertext. However, only those who know the corresponding private key can decrypt the ciphertext to obtain the original message.

Asymmetric Cryptography Digital Signatures:

Asymmetric cryptography is widely used in digital signatures to ensure the authenticity and non-repudiation of documents or messages.

Side-Channel Information Leakage in Ciphertext:

Anyone obtaining the ciphertext does not need to decrypt it. By performing cryptographic calculations on the ciphertext, one can acquire the public key ID used to encrypt that ciphertext.

Layer Minus Network Data Packet:

A Layer Minus network data packet does not contain any metadata. It is a data packet encrypted using the public key of the recipient.

Layer Minus Nodes:

Nodes are crucial facilities that make up the Layer Minus wallet routing network, and they perform the following tasks:

  1. Inter-Node Data Transmission:

    • When a node receives encrypted data not associated with itself, it forwards that encrypted data to the intended destination node.

    • The destination node pays the corresponding traffic fee for receiving the forwarded data.

  2. Proxy Recipient:

    • Nodes accept client commissions to act as proxies for clients receiving encrypted messages at a specific wallet address.

    • When the commissioned client is online, the node forwards the encrypted messages to that client.

    • The node pre-collects the client's payment for using the service and deducts fees for forwarding data from other nodes in the prepaid amount.

  3. Proxy Recipient Data Caching:

    • Nodes accept client commissions to act as proxies for clients receiving encrypted messages at a specific wallet address.

    • When the commissioned client is offline, the node caches the encrypted messages.

    • Upon the next online session of the commissioned client, the node sends all cached encrypted messages, calculates the corresponding storage fees, and deducts them from the prepaid amount.

  4. Online Client Data Delivery:

    • Clients, through the HTML protocol, connect to an entry node and link to a proxy recipient node associated with their wallet.

    • The proxy recipient, using the HTML Server-Sent Events (SSE) communication protocol, pushes incoming data packets to the client.

Routing

Traffic Obfuscation:

Layer Minus operates a virtual network established using the W3C HTTP protocol at the application layer of the OSI network communication model. The communication within Layer Minus does not exhibit any distinct characteristics; this is a unique feature of the Layer Minus network.