We
believe

you should have access to and control of your own data online.

the tools you use should empower you to share data without fear.

That’s why the Mainframe platform builds on five fundamental principles

1

Encryption

Your Content Can't Be Opened

All communication on the Mainframe protocol will utilize the most reliable standards in end-to-end encryption. No outside party, whether government, corporate, or rogue hacker, will have access to your data.

Each Mainframe node has an asymmetric key pair associated with it. These keys are used to decrypt data intended for this node. When one node wishes to send data to another, it encrypts the data using the public key of the intended recipient node. This public key is obtained from a prior exchange of contact information that occurs out-of-band, such as by consulting a directory of contacts, or from a direct exchange of public keys between individuals. Packet encryption is part of Mainframe's transport protocols and cannot be circumvented.

For messaging, when data is being shared in a group setting, it must be encrypted in a way that prevents would-be eavesdroppers from gleaning content or identifying the group participants. Although it is possible for the sender to encrypt the message separately for each recipient, this results in significant CPU and network loads as the number of participants in the group increases. Mainframe provides protocols for group shared key negotiation so that group participants can send encrypted messages more efficiently to one another.

Diagram

More details

2

Dark Routing

Your Content Can't Be Followed

The network is built from the ground up to frustrate any attempt at tracking the path data packets take. Identifying or monitoring even the existence of communication between parties is effectively impossible.

Despite their use of encryption, conventional applications still allow malicious actors to glean information about who is communicating with whom. Mainframe allows users to prevent this using configurable dark routing. Applications are able to select the appropriate level of specificity when addressing data packets to other nodes. Too much specificity increases the possibility that malicious actors could identify communication, while too little delays data transmission and increases transmission costs. Mainframe algorithmically determines sensible default routing settings based on network conditions and users' privacy requirements.

Because data packets do not need to be fully addressed, nodes must have another means of identifying messages they are interested in viewing. For messaging applications, this is done using topic IDs. When a peer-to-peer or group discussion is initiated, a topic ID is selected at random and shared privately with all participants, who then listen for future messages with the same topic ID. Even if nodes select a topic ID that is already being used by other nodes, they will only be able to decrypt messages from group members who have the previously agreed-upon shared key and will ignore other messages in the topic, so topic IDs help nodes reduce processing overload for irrelevant messages but gracefully handle collisions.

Diagram

More details

3

Incentivization

The Network Can't Die

With token incentivization, Mainframe can adapt as a vibrant, active, living network. The token economy incentivizes each node to provide bandwidth for packet relay and storage, data services, file storage. and more. Each node's creditworthiness is constantly tracked.

Mainframe communications make use of a generalized model for incentivized service provision called "Swap, Swear, and Swindle." This model is used to incentivize packet routing, packet holding, file storage, and database storage, and other application services, while optimizing for bandwidth requirements and associated cost.

Diagram

More details

4

Peer-to-Peer Architecture

The Network Can't Be Shut Down

All data services that your Mainframe applications rely on are distributed in redundant fragments throughout the network. This eliminates the need to rely on or manage your own infrastructure, and makes it extremely difficult for would-be censors to deny access.

Decentralized data services will allow application data to be stored in a secure distributed fashion throughout the blockchain network without reliance on any infrastructure, including self-deployed cloud services for data storage. Blockchain nodes will be able to request that data be stored on their behalf while they are disconnected, for a fee. Nodes can also incentivize the storage of data or files, the processing of asynchronous tasks, the routing of messages, or the management of payments, all with Mainframe tokens.

Diagram

More details

5

Interoperability

The Network Works Everywhere

The Mainframe protocol will be available to any app, network, or blockchain that requires truly private communication services. SDKs and other tools for interoperability will be deployed based on community needs. Our tools for secure messaging will reach across blockchains with smart contract support, including Ethereum, RSK, and Tezos.

More details