In case of emergency, the user is able to stay connected to Zentalk without having internet access. (Offline to Offline)
Zentalk will execute first-class encryption while sending and receiving messages. Only the sender and recipient can view private messages end to end with a Hashing function Blake2.
Zentalk will be supported in multiple languages to help and understand Zentalk.
Zentalk protects your communications protocol from large companies that have your message protocol and sells it to large companies for their marketing purposes.
Zentalk reward and pays you with Zenta token after you are helping to forwarding the messages over Zentamesh Network.
A mesh network is a network topology in which each node relays data for the network. Zentachain implements .cjdns- nodes an encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing. This provides near-zero-configuration networking and prevents many of the security and scalability issues that plague existing networks. All mesh nodes cooperate in the distribution of data in the network. Devices that are using Zentalk act as nodes on the Zentamesh. These nodes have the unique ability to interconnect with one another in a distributed fashion. Mesh networks can relay messages using either a flooding technique or a routing technique. With routing, the message is propagated along a path by hopping from node to node until it reaches its destination. To ensure all its paths' availability, the network must allow for continuous connections and must reconfigure itself around broken paths, using self-healing algorithms such as Shortest Path Bridging. Self-healing allows a routing-based network to operate when a node breaks down or when a connection becomes unreliable. As a result, the network is typically quite reliable, as there is often more than one path between a source and a destination in the network. Although mostly used in wireless situations, this concept can also apply to wired networks and to software interaction. An example of common mesh network technology used in everyday life would be wireless domotica (like the Z-wave protocol). When you register a new node in the house, let’s say a new light bulb, the device pairs with the control center through a self-configured mesh network. Each new device is a new node in the Zentamesh, relaying the data communication. Mesh-networks are typically wireless - however, Zentachain Meshnet is about the blockchain-based network topology and less about infrastructure. Zentalk achieves technological darkness, this means no metadata can be discovered about its users or their messages. This is achieved through the integration of the Meshnet and its architecture. Zentalk pushes, drags, and tunnels all messages and data through the Zetamesh. This ensures that any messages shared between the sender and recipient have the highest levels of privacy. In a meshed network, each network node is connected to one or more nodes. When multiple nodes are interconnected, this is known as a fully meshed network. When a message is sent from Zentalk, the data is sent through the Zentamesh and is passed from one node to the next, until the message has reached the desired recipient. By design nodes in the Zentamesh don't know which node sent which message or exactly which node receives said message. This leads to total anonymity for or sender and recipient. The sender uses 1 node to get to its receiver. This one node will be rewarded in ZENTA to deliver the encrypted message. If there are not many nodes available in your area so Zentalk will be connected over the Tor network to arrive the message.