In case of emergency, the user is able to stay connected to Zentalk without having internet access. (Offline to Offline)
Zentalk will execute first-class encryption while sending and receiving messages. Only the sender and recipient can view private messages end to end with a Hashing function Blake2.
Zentalk will be supported in multiple languages to help and understand Zentalk.
Zentalk protects your communication protocol from large companies that have your message protocol and sells it to large companies for their marketing purposes.
Zentalk rewards user with Zenta token supporting and host a Zentanode for forwarding the messages in the Zentamesh network.
A meshed network is a network topology in which each node relays on the data for the network. Zentachain implements .cjdns- nodes an encrypted IPv6 network using public-key cryptography for addressing allocation and a distributed hash table for routing. This provides near-zero-configuration networking and prevents many of the security and scalability issues that plague existing networks. All meshed nodes cooperate in the distribution of data in the network. Devices that use Zentalk act as nodes on the Zentamesh. These nodes have the unique ability to interconnect with one another in a distributed fashion. Meshed networks can relay messages using either a flooding technique or a routing technique. With routing, the message is propagated by hopping from one node to another node until it reaches its destination. To ensure all the availability of the path the network must allow for continuous connections and must reconfigure itself around broken paths, using self-healing algorithms such as Shortest Path Bridging. Self-healing allows a routing-based network to operate when a node breaks down or when a connection becomes unreliable. As a result, the network is typically quite reliable, as there is often more than one path between a source and a destination in the network. Although mostly used in wireless situations, this concept can also apply to wired networks and to software interaction. An example of common meshed network technology used in everyday life would be wireless domotica (like the Z-wave protocol). When you register a new node in the house and let’s say a new light bulb, the device pairs with the control center through a self-configured meshed network. Each new device is a new node in the Zentamesh and relaying the data communication. Mesh-networks are typically wireless - however Zentachain Meshnet is about the blockchain-based network topology and less about infrastructure. Zentalk achieves technological darkness it means no metadata can be discovered about its users or their messages. This is achieved through the integration of the Meshnet and its architecture. Zentalk pushes, drags and tunnels all messages and data through the Zetamesh. This ensures that any messages shared between the sender and recipient have the highest levels of privacy. In a meshed network, each network node is connected to one or more nodes. When multiple nodes are interconnected, this is known as a fully meshed network. When a message is sent from Zentalk, the data is sent through the Zentamesh and is passed from one node to the next, until the message has reached the desired recipient. By design nodes in the Zentamesh don't know which node has sent the message or exactly which node are receives the message. This leads to total anonymity for or sender and recipient. The sender uses 1 node to get to its receiver. This one node will be rewarded in ZENTA to deliver the encrypted message. If there are not many nodes available in your area so Zentalk will be connected over the Tor network to arrive the message.