Tachyon Protocol

A Decentralized Internet Protocol

Building the Next-Generation TCP/IP to Empower Blockchain Infrastructure

Tokenize the Protocol with 50 Million Users

Brief Overview
Tachyon Booster UDP

1000% faster than TCP/IP

90% connectivity rate on weak networks

99.99% reliability of the network

Tachyon Security Protocol

ECDHE-ECDSA asymmetric encryption

8 encrypted tunnels to protect data

Reconstruct the security of blockchain

Tachyon Anti-analysis

50 million distributed nodes Joined

100% anonymous , No central server

Unblock 99% of the firewalls/fliters

Video

Safer

Faster

More Stable

More Reliable

More Anonymous

Lanuched from V SYSTEMS
  • The First General Purpose Blockchain Database by Sunny King, Inventor of PoS;
  • World Top 5 Staking Coin by Staked.us;
  • Rank 27th on Coinmarketcap.
Learn more about V SYSTEMS
Combined with X-VPN Tech
  • World Leading VPN solution Provider;
  • 50,000,000 Global Users;
  • Top 20 Mobile App on App Store and Google Play.
Learn more about X-VPN
Benefit for 900 Million+ Users
  • The Emergence of Cybersecurity Issues is on The Rise;
  • 30% of the Internet Users is the VPN Users;
  • VPN is Used Once A Week for 70% of Users.
Data refers from GlobalWebIndex

Why Tachyon Protocol?

Cybersecurity and privacy protection fall into the trap of the centralized network

TCP/IP is not secure, robust and efficient enough for blockchain

Application Layer

HTTP

HTTP lacks security, vulnerable to penetration&hijacking
HTTPS loses on speed and plain text is easy to block

Transport Layer

TCP

TCP consumes lots of time and bandwidth due to it's ACK mechanism
It is also vulnerable to attacks such as Dos, DDoS, CC...

Internet Layer

IP

IP addresses are easily traced and the number of the IPs are limited

Data Link Layer

Ethernet

Data overloading could cause along period time of network congestion
The entire network may be down for minor issues on centralized nodes

Centralized VPNs cannot promise absolute security and privacy

Privacy Policies are nothing but plain statements

User data had been sold by VPN providers on multiple occasions

Centralized VPNs are compromised when comes to authorities

Network stability cannot be guaranteed thus the speed varies

How does Tachyon Protocol
rebuild the TCP/IP?

TCP/IP Model

Tachyon Booster UDP

Application Layer

HTTP

Application Layer

ACK…

Transport Layer

TCP

Transport Layer

UDP

Internet Layer

IP

PPPoIP DHT

Internet Layer

IP

Data Link Layer

Ethernet

Data Link Layer

Ethernet

Implement acknowledge mechanism, improve stability;
Automatically analysis the network condition, improve connectivity rate up to 90%;
Increase transfer efficiency by replacing TCP with UDP, UDP offers more security protections;
Tachyon DHT ensures a robust, stable network;
Base on Real-time routing system to choose the optimal connection
Decentralized P2P network based on PPPoIP protocol, no central server to worry about storage protection and data request
Tachyon Security Protocol
Tachyon
Anti-analysis
  • Distribute users requests through multiple different nodes with encryption
  • It will exponentially increase the difficulty for the attacker to get hold of the complete messages
Tachyon SDK
Easy integration, compatible with all blockchain Standard API, supports all popular languages & systems
Blockchain integration to empower ecosystem
How can Tachyon Protocol
contribute for Blockchain?
Integrate Tachyon Protocol to strengthen the stability, security, privacy and transfer speed of V SYSTEMS DeFi ecosystem.
About IPX Token

The Next GenerationTCP/IP Internet Protocol Stack driven by IPX Token

The IPX Token is the cryptocurrency of the Tachyon Protocol. On the Tachyon platform, the IPX Token will be used to pay data transferring fee, staking the traffic supernode, leasing, and mining. The IPX Token will also be used to pay the fee on future Tachyon sidechain and cross-chain application on V SYSTEMS mainnet.

The
Roadmap
Notice: The content described in this presentation are the planned features of the Tachyon Protocol and IPX Token are subject to many external factors such as technology shift and/or market change. These technologies also require large capital and years of R&D to realize.