Skip to content

A peer-to-peer content delivery network that makes information uncensorable and unstoppable through distributed storage, encryption, and incentivized hosting - ensuring free speech and access to information globally.

Vision

Create an internet where information cannot be censored, deleted, or controlled by any single entity - powered by cryptographic proof and economic incentives.

Core Principles

Censorship Resistance

  • No single point of control
  • Content-addressed (not location-based)
  • Redundant storage across nodes
  • Encrypted content for privacy
  • Anonymity for publishers and readers

Availability Guarantee

  • Automatic replication
  • Geographic distribution
  • Economic incentives for hosting
  • Redundancy through erasure coding
  • Permanent storage options

Privacy Protection

  • End-to-end encryption
  • Anonymous publishing
  • Zero-knowledge proofs for access
  • Metadata minimization
  • Tor/I2P integration

Technical Architecture

Storage Layer

  • IPFS: Content-addressed distributed storage
  • Filecoin: Incentivized long-term storage
  • Arweave: Permanent data storage
  • Erasure Coding: Redundancy without duplication

Network Layer

  • Libp2p: Modular p2p networking
  • DHT: Distributed hash table for content discovery
  • NAT Traversal: Direct peer connections
  • Tor Integration: Anonymous routing

Incentive Layer

  • Cryptocurrency Rewards: Pay for bandwidth and storage
  • Proof of Replication: Verify data availability
  • Reputation System: Trust worthy nodes
  • Staking: Commit to long-term hosting

Key Features

Content Publishing

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
// Publish content immutably
const cid = await ipfs.add({
  content: encrypted_content,
  metadata: {
    title: "Article Title",
    author: "0x...",  // Cryptographic identity
    timestamp: Date.now(),
    signature: sign(content, privateKey)
  }
});

// Content is now accessible at /ipfs/{cid}
// Forever, by anyone, from anywhere

Economic Model

  • Publishers pay for initial replication
  • Readers contribute bandwidth
  • Hosters earn from storage and serving
  • Tipping mechanism for quality content
  • Subscription via cryptocurrency
  • Decentralized search engine
  • Tag-based discovery
  • Social graph recommendations
  • Content verification badges
  • Community curation

Censorship-Resistant Features

Unstoppable Publishing

  • No domain seizure (content-addressed)
  • No server takedowns (distributed)
  • No ISP blocking (peer routing)
  • No DNS censorship (ENS/Handshake)

Anonymous Access

  • Tor/I2P integration for readers
  • No IP logging
  • Encrypted requests
  • Zero-knowledge authentication

Content Moderation

  • User-controlled filtering
  • Community-based tagging
  • Personal block lists
  • Reputation-based trust
  • No central authority

Use Cases

  1. Journalism: Whistleblowers and investigative reporting
  2. Activism: Organize in oppressive regimes
  3. Archives: Preserve historical records
  4. Academic: Free access to research
  5. Personal: Uncensorable personal publishing

Anti-Censorship Technology

Domain Fronting

  • Circumvent DNS blocking
  • Use CDN networks as proxies
  • Steganography in legitimate traffic

Bridge Nodes

  • Hidden entry points
  • Constantly changing addresses
  • Invite-only discovery
  • Pluggable transports

Traffic Obfuscation

  • Look like normal HTTPS traffic
  • Randomized packet sizes
  • Timing obfuscation
  • Decoy traffic

Content Integrity

Verification

  • Cryptographic signatures
  • Proof of authorship
  • Timestamp verification
  • Change history tracking

Version Control

  • IPFS provides immutability
  • Updates through new CIDs
  • Historical versions preserved
  • Fork and remix support

Governance

Decentralized Moderation

  • No central moderators
  • Community-driven reputation
  • Transparent rules via smart contracts
  • Appeal mechanisms
  • Democratic decision-making

Economic Sustainability

  • Storage fees fund network
  • Bandwidth sharing economy
  • Advertisement via crypto
  • Voluntary donations
  • Foundation grants

Privacy Features

Anonymous Publishing

  • Pseudonymous identities
  • Zero-knowledge proofs
  • Metadata scrubbing
  • Timing attack resistance

Reader Privacy

  • No tracking
  • No analytics (unless opt-in)
  • Local-first reading
  • Encrypted recommendations

Challenges

  • Illegal content handling
  • DMCA compliance alternatives
  • Jurisdiction ambiguity
  • Liability questions

Technical

  • Scalability of DHT
  • Cold start problem
  • Incentive design
  • Sybil attack prevention

Social

  • Adoption by mainstream users
  • Content discovery
  • Handling truly harmful content
  • Balancing freedom and safety

Differentiators

  • vs Tor: Permanent storage, not just routing
  • vs IPFS alone: Economic incentives, search
  • vs Torrents: Web-compatible, encrypted, paid
  • vs Cloud: Uncensorable, distributed, private

Implementation Phases

Phase 1: Storage

  • IPFS/Filecoin integration
  • Basic publishing tools
  • Simple content addressing

Phase 2: Discovery

  • Decentralized search
  • Social recommendations
  • Tag system

Phase 3: Incentives

  • Cryptocurrency rewards
  • Bandwidth marketplace
  • Reputation system

Phase 4: Applications

  • Blog platforms
  • Video streaming
  • Social networks
  • Wikis and forums

Expected Impact

  • Enable free speech globally
  • Preserve important information
  • Protect journalists and activists
  • Decentralize information power
  • Make censorship economically infeasible
  • Ensure access to knowledge as a human right