Zentalk is the beginning of a new era in private messaging â€” utmost secure and decentralized
by Zentachain, October 4, 2018
Zentalk is based on the cjdns network routing protocol. Cjdns is an IPv6 network that ensures all information sent over it is protected by end-to-end encryption. This simplifies retrieving an IP address. Routing does not require memory queries. DDoS attacks (Distributed Denial of Service) are almost impossible to carry out over the Cjdns network.
Benefits of Zentalk:
- Total anonymity
- Full end-to-end encryption
- protection against ddos attacks
Cjdns implements encryption while using public-key cryptography to generate IP addresses. Computers and nodes can not communicate with each other until the connection has been authenticated. This ensures that traffic cannot be intercepted.
Routing through cjdns is handled through the use of a distributed hash table (DHT) and thus does not require memory for lookups. A DHT is similar to a typical hash table, but the maintenance (key, value) pairs are distributed on nodes in the system. A DHT must be decentralized, fault tolerant, and scalable.
This implementation will make Zentalk more resistant to DDoS attacks. This is achieved by using a technique similar to Virtual Ring Routing. Virtual Ring Routing uses a flat address space. Each node has knowledge about the ring structure, but the underlying physical network can change dynamically.