Democracy. Privacy. Security. High Speed.

Tokenize the Protocol with 50 Million Users

WHITEPAPER
PRE-MINING
200% faster in complex network conditions

90% connection rate on weak network

95% stability of the network

200%~1000% faster than TCP/IP

Stay fully private

Multi-path routing for single-point attack

Multi-relay forwarding for MITM attack

Token for both trading and value

Advanced security for data protection

ECDHE-ECDSA asymmetric encryption

Protocol simulation to protect data

Add random data to disorganize data

Driven by DAO with stronger vitality

P2P network without central node

Everyone can participate in network construction and community governance

Clear incentives to ensure the vitality of the network

Unblock streaming & social networking

9 tunnels to help you bypass filters and firewalls

Unblock streaming & social networking anywhere

Gain access to Facebook, Netflix, Spotify and other platforms

Easy setup

Standard API to easy integration with all blockchain

Support all popular languages & systems

Highly customizable modules

Launched from V SYSTEMS
  • The First General Purpose Blockchain Database by Sunny King, Inventor of PoS;
  • World's top 5 staking coin by Staked.us;
  • Top 30 on Coinmarketcap.
Learn more about V SYSTEMS
Combined with X-VPN Tech
  • World's Leading VPN solution provider;
  • 50,000,000 global users;
  • Top 20 Mobile App on App Store and Google Play.
Learn more about X-VPN

Why Tachyon Protocol?

Cybersecurity and privacy protection fall into the trap of the centralized network

TCP/IP Security Vulnerabilities and Low Efficiency

Application Layer

HTTP

HTTP lacks security, vulnerable to penetration & hijacking.
TLS has high deployment costs and learning costs.

Transport Layer

TCP

The TCP three-way handshake mechanism and congestion control mechanism would result in both bandwidth and time wastage.

Internet Layer

IP

IP addresses are often tied to the physical address and can be easily traced.

Data Link Layer

Ethernet

Bus topology posses congestion issue when collisions occur.
Star topology cannot afford central hub failure as it would cause the network inoperable.

Trust Issues with the Centralized VPN Providers

Privacy Policies are nothing but plain statements.

User data had been sold by VPN providers on multiple occasions.

Centralized VPNs make compromises when comes to retention laws & data requests.

Network stability cannot be guaranteed thus the speed varies.

How does Tachyon Protocol
rebuild the TCP/IP?

TCP/IP Model

Tachyon Booster UDP

Application Layer

HTTP

Application Layer

ACK…

Transport Layer

TCP

Transport Layer

UDP

Internet Layer

IP

PPPoIP DHT

Internet Layer

IP

Data Link Layer

Ethernet

Data Link Layer

Ethernet

Implement ACK, FEC and bandwidth auto-scaling to improve stability;
Multi-protocol Smart Circumvent Scheme improves connection rate up to 90%;
Increase transfer efficiency by upgrading TCP with UDP;
Tachyon DHT ensures a robust, stable network;
Base on Real-time routing system to choose the optimal connection;
Decentralized P2P network based on PPPoIP protocol, no central server to worry about storage protection and data request.

Tachyon Security Protocol

Function of TSP

Tachyon
Anti-analysis

  • Multi-path routing to distribute users’ requests through multiple different nodes with encryption for single-point attack
  • Multi-relay forwarding to minimize the possibility of communication monitoring/tracking in the network
Concurrent Multi-path Routing

Tachyon SDK

Standard API to easy integration with all blockchain
Support all popular languages & systems
Highly customizable modules

How does Tachyon Protocol
work?

Integrate Tachyon Protocol to strengthen the stability, security, privacy and transfer speed of V SYSTEMS DeFi ecosystems.
Multi-relaying Scheme

Tachyon Protocol Use Cases

VPN
CDN
Decentralized Storage
DeFi
loT
DNS
VPN: Tachyon VPN will bring ultra cost-effective blockchain solutions that ensure advanced cybersecurity and privacy protection directly to all users.
VPN
CDN: As a content distribution network, CDN network has advantages in the number and distribution of edge nodes and the speed of network synchronization. The decentralized Tachyon network distributes tens of millions of nodes around the world so the quantity and coverage exceed the centralized CDN service.
CDN
Decentralized Storage: Tachyon protocol can add an extra layer of protection by encrypting the contents in storage and during transmission, as well as accelerate the transmission efficiency.
Decentralized Storage
DeFi: It uses the blockchain technologies and smart contract to form a machine & algorithm-based trust to replace the human agents and third party-agencies with a goal to provide a transparent, efficient and low-cost financial system.
DeFi
IoT: As an important part of the new generation information technology, IoT has been widely used in various industries, such as smart home, internet of vehicles, industrial manufacturing, environmental monitoring, environmental sensors, etc.
IoT
DNS: An important and ubiquitous function of DNS is its central role in distributed Internet services such as cloud services and content delivery networks. It is able to actively promote or almost completely block any website.
DNS

About IPX
Token Economics

The Next Generation TCP/IP Internet Protocol is Driven by IPX Token

Tachyon Protocol will introduce IPX Token as the native crypto-currency of the network. The initial supply of the IPX token is 1,000,000,000 (one billion). As token hosted by the V SYSTEMS blockchain, IPX token serves a clear purpose and utility in the overall Tachyon ecosystem.

IPX Token use cases:
  • Identity verification
  • Trading and store of value
  • Make the protocols driven by DAO
  • Incentive & cooperative mechanism

Roadmap

Roadmap Roadmap