Recent geopolitical events such as President Trump’s order to ban TikTok and WeChat in the US have illustrated the need for decentralization. The next generation of the internet will allow people to own their data, share their wealth, and control their fingerprints without the whims of politicians and tech giants who historically built the web for their own benefit.
Content of addressable memoryor CAS, like IPFS, removes the dependency on route addressing like URLs. Content routing can prevent malicious behavior such as file path attacks and content tampering.
Peer-to-peer routing for communication– Internet communication should use peer-to-peer protocols such as dynamic hash tables and be supplemented by a variety of decentralized communication protocols such as email and onion routing (Tor). Another goal is to prevent single point attacks on communication lines.
Personal computer in the cloudToday’s so-called Internet client / server model calls for one client to use another computer (the server) for computationally intensive tasks, e.g. For managing high-traffic blogs or on-demand videos. In this process, the client transfers control of the data to the server. Building a personal cloud computer, or PC2, that is as powerful as any public cloud, like an elastic cloud computer, is an important paradigm shift for the new internet. This transition can also be referred to as serverless computing – serverless, no interference.
Private hardware and virtual machines in public clouds are used as private miners to implement decentralized cache and relay services, ie exchangeable software components, for the dynamic expansion of PC2 functions. The randomly selected miners offer computing power and are not linked to interests or interests in terms of content. You yourself make money subjectively and objectively protect the privacy of user data.
Network operating system: The Internet requires a network operating system that implements end-to-end encryption, storage, calculation, activation, planning and search functions for PC2 virtual machines. Such a network operating system is important to facilitate the separation of computers and communications. This ensures that applications cannot select communication protocols directly, which prevents routing protocols from being changed accidentally, hackers from attacking applications, and preventing application software from being able to undermine privacy and spread viruses.
There is a general consensus that all applications should connect directly to the TCP / IP protocol, but that is not the reality we live in. More than 40 years ago, the UNIX programming paradigm gave applications direct access to the Internet’s packet-switched network, which is now the main cause of almost all Internet security holes. Over time, we will see unified virtual connections and packet-switched protocols in one end-to-end encrypted solution that combines the best of both worlds.
Decentralized identity– As the internet needs to connect a wide range of people, institutions, businesses and countries, features such as decentralized identity, content storage, incentive tokens, profit sharing and digital goods are required. Blockchain technology is the only tool that can support these functions for the next generation of the internet.
I am confident that the efficiency and user experience of the new internet will match that of today’s mobile internet. Central storage, communication, computer and blockchain technologies make up an Internet computer, and the emergence of a unified network operating system is the key to its realization. The next generation internet will be safer, more egalitarian and more user-centric.
The views, thoughts, and opinions expressed herein belong solely to the author and do not necessarily reflect or represent the views and opinions of Cointelegraph.