The Zone Internet Peer Protocol, or ZIPP, is an innovative endeavor that combines the principles of decentralized data storage with secure access methodologies. Built on the foundation of IPFS for data distribution, ZIPP also integrates the Shimmer network for its initial testing phases.

Vision

ZIPP is determined to champion the cause of a free internet, aiming for a realm where data can be hosted without the fear of external control, manipulation, or reprisal. The goal is to create an ecosystem that is scalable, user-friendly, and freely accessible to everyone. However, it is not a platform for illicit activities but stands as a symbol of a transparent internet.

Key Features

  • Decentralized Storage: Built on IPFS to ensure redundancy and heightened security.
  • Traffic Anonymization: By routing traffic through Tor, ZIPP provides users with increased anonymity, supplemented by its unique "zipp://" address system.
  • Integrated Cryptocurrency: ZIPP is initially integrated with the Shimmer network, with plans to potentially transition to its own distributed coin.
  • Temporary Storage with Incentivized Longevity ("Paid to Live" Concept): Unlike many platforms that only reward storage providers, ZIPP's model ensures data has a "lifespan" that can be extended through payments, ensuring only data deemed valuable remains accessible.

Technical Insights

  • Data Reassembly: ZIPP emphasizes on reconstructing fragmented data locally on the user's device, prioritizing user privacy.
  • Economic Model: Users can earn rewards by contributing storage space and bandwidth. Initial transactions will utilize the Shimmer network.
  • Fixed Token Supply: Only 100,000 ZIPP tokens will be minted, ensuring value preservation.

Distinctive Features

  • ZIPP Browser Extension: A tool for direct communication using the zipp:// protocol.
  • ZIPP Node Software: The backbone of the ecosystem, it integrates IPFS for data storage and Shimmer nodes for secure transactions, all managed by a unique routing layer.
  • Domain System: ZIPP introduces a unique domain system, leveraging the Shimmer network, which simplifies accessing hosted data.

Technical Aspects

  • Data Fragmentation & Encryption: Data is fragmented and encrypted before distribution for enhanced security.
  • Staking & Trust Mechanism: Nodes stake ZIPP tokens, which directly correlates to their trust rank, thus influencing their potential earnings.

Compliance

ZIPP has been designed primarily for decentralized communication for dapps. Any illicit activities or misuse of the platform is strictly condemned.

Conclusion

ZIPP is not just another addition to the decentralized internet solutions; it's a vision for the future. By integrating foundational technologies and introducing its unique features, ZIPP hopes to offer a platform that is private, accessible, and shapes the future of decentralized internet based on feedback and experiences.

ZIPP Whitepaper: Zone Internet Peer Protocol (currently updating, concept)

1. Introduction

ZIPP, short for Zone Internet Peer Protocol, is an endeavor to combine decentralized data storage with secure access methodologies. Using IPFS for data distribution and partnering with the Shimmer network for initial testing, ZIPP aspires to create a platform that emphasizes privacy and decentralization.

1.1 ZIPP Vision and Purpose

"The purpose of the ZIPP network is to pioneer a decentralized and secure avenue for running applications, facilitating communication, and enabling seamless information sharing between users. We envision an ecosystem that stands free from ownership, external control, and manipulation. The ZIPP protocol embodies the spirit of a free internet, a realm where data can be hosted without fear of reprisal. Our goal is to craft a network that is scalable, incentivized, user-friendly, and accessible to all at no cost. While we champion freedom, ZIPP is not intended for illegal activities but as a beacon of a free and transparent internet." - Lance.

1.2 Core Focus

ZIPP amalgamates the robustness of IPFS, the privacy-centric features of TOR, and the economic incentives of the Shimmer network to lay the groundwork for a next-generation decentralized internet.

1.2.1 Technical Foundation

  • Distributed Data Hosting with IPFS: ZIPP harnesses the power of IPFS for decentralized data storage. Files are compressed using 7z, encrypted with AES-256, and then fragmented across the IPFS network, ensuring redundancy, speed, and security.
  • Anonymous Communication via TOR: All network communication within ZIPP is routed through TOR, ensuring users' privacy and security against potential surveillance or data breaches.
  • Economic Layer with Shimmer: ZIPP introduces an economic layer by adopting a coloured token, named ZIPP, on the Shimmer network. This segregation ensures that transactions remain separate and secure, while also providing an incentive mechanism for network participants.

1.2.2 Scope

ZIPP's primary objective is to revolutionize internet communication by weaving together these potent technologies. The platform's essence lies in its modular node software, designed for adaptability and scalability. This open-source approach encourages community-driven enhancements, especially in the areas of routing and zoning between nodes. One of ZIPP's standout features is its ability to incentivize data hosting, where participants are rewarded for ensuring data longevity and availability.

By uniting these technologies under a single umbrella, ZIPP seeks to lay the groundwork for a decentralized, incentivized, and user-centric internet of the future.

2. Core Concepts of ZIPP

  • Decentralized Storage: ZIPP uses IPFS to store data, aiming for improved redundancy and security.
  • Traffic Anonymization using Tor: ZIPP routes its traffic through the Tor network for added anonymity, while introducing its own zipp:// address system.
  • Integrated Cryptocurrency: ZIPP will start by integrating with the Shimmer network for its initial phase, as a stepping stone. Depending on feedback and requirements, there's potential for transitioning to its own distributed coin.

3. ZIPP Runtime: Local Data Reassembly

ZIPP focuses on reconstructing fragmented data on the user's device to prioritize user privacy and accessibility.

4. Economic Model

  • Hosting and Rewards: By contributing storage space and bandwidth, participants can earn rewards for hosting encrypted data fragments.
  • Payments: Initially, the Shimmer network will be used for transactions. Future decisions about transitioning to a proprietary distributed coin will be based on the project's progress.

4.1 Allocation

ZIPP's economic model is designed to incentivize participation and ensure the network's growth and sustainability.

  • Generous Allocation: 75% of the ZIPP tokens are allocated as rewards for network participants, fostering community growth.
  • Reserved Resources: 20% is reserved for the ZIPP Foundation, with an additional 5% set aside for the team behind ZIPP.
  • Value Creation: While account creation on ZIPP is free, value is added when users store data on the network.

4.2 Token Structure and Supply

The ZIPP network operates with a clear and limited token supply to maintain value and predictability.

  1. Fixed Supply: Only 100,000 ZIPP tokens will ever be minted, ensuring scarcity and value preservation.
  2. Granularity: Each ZIPP token can be subdivided into smaller units. This subdivision allows for microtransactions, precise pricing, and flexibility in transacting on the ZIPP network.

5. ZIPP Client

5.1 ZIPP Browser Extension

  • ZIPP-specific Communication: The extension enables communication using the zipp:// protocol, acting as the primary access point to the ZIPP ecosystem.
  • Open Source Approach: ZIPP promotes transparency and welcomes contributions from the developer community.

5.2 ZIPP Node Software Overview

5.2.1 Introduction

The ZIPP Node Software is the backbone of the ZIPP ecosystem. It combines IPFS for decentralized data storage and Shimmer nodes for secure transactions, enhanced with a routing layer that manages communication and data distribution across zones.

5.2.2 IPFS Integration

The Node Software employs IPFS, a peer-to-peer file-sharing protocol, to handle data fragmentation, distribution, and storage, ensuring optimal redundancy and security across the network.

5.2.3 Embedded Shimmer Node

An embedded Shimmer node facilitates secure, cryptocurrency-based transactions within the ZIPP ecosystem, serving as the touchpoint for all financial interactions.

5.2.4 Routing Layer

The unique routing layer in the Node Software manages:

  • Data Distribution: Ensures uniform data distribution across zones.
  • Zone Communication: Oversees inter-zone communications for efficient data exchange.
  • Request Handling: Directs data requests based on ZIPP addresses for prompt retrievals.
  • Payment Routing: Channels payment and reward processes seamlessly.

5.2.5 Zoning Mechanism

Zoning, introduced in the Node Software, offers:

  • Scalability: Organized nodes enhance the network's ability to scale effectively.
  • Data Management: Data operations become more streamlined within zones.
  • Fault Tolerance: Even if individual nodes or zones face issues, the larger network remains operational.

5.2.6 SDK and Associated Services

The ZIPP SDK offers a toolkit for developers to integrate with the ZIPP network, allowing for custom applications and easy data fetching. The ZIPP ecosystem will also feature clearnet websites such as upload.computer for free data storage, map.pics for decentralized photo sharing, and friend.software for decentralized chatting and file sharing.

Furthermore, the ZIPP Foundation has reserved the domain zipp.org for foundational use, ensuring a centralized point of reference and information for the community. For those interested in node software and automatic script installations, zipp.run will serve as the go-to destination, streamlining the setup process and enhancing user experience.

Beyond traditional domains, ZIPP is pioneering in the realm of decentralized blockchain domains. Domains like zipp.crypto, zipp.wallet, and zipp.go have been secured to create decentralized interfaces that directly access the ZIPP network. The vision is for users to effortlessly engage with the ZIPP ecosystem without requiring any browser addons. For instance, by simply navigating to zipp.go, users can instantly tap into the power and potential of the ZIPP network which will act as a bridge.

5.2.7 Conclusion

The ZIPP Node Software showcases the harmonization of IPFS for data management and Shimmer for financial operations. With its routing layer and zoning mechanism, ZIPP presents a platform that is scalable, efficient, and prepared for future expansions.

6. Technical Aspects of ZIPP

  • Data Fragmentation: ZIPP fragments data into blocks, distributing them across the network.
  • End-to-End Encryption: Data is encrypted before distribution for enhanced security.
  • Address-Based Routing: The unique ZIPP address, formatted as zipp://data_address, acts as both an identifier and access key.
  • Anonymity: By integrating Tor, ZIPP prioritizes user traffic anonymity.
  • Payment Integration: ZIPP addresses also serve as payment channels.
  • Zoning with IPFS: ZIPP adds zoning to IPFS, promoting further decentralization.
  • Router Layer for Communication: The routing layer bridges IPFS and the cryptocurrency network, overseeing data operations and payments.

6.1 Accessing Content on ZIPP:

  1. User Request:

    A user inputs a ZIPP address in their browser equipped with the ZIPP extension or accesses the ZIPP network via another compatible client.

  2. ZIPP Extension or Client Action:

    The client parses the ZIPP address, extracting the necessary routing, content key, and other relevant components. This information is then utilized to query the underlying IPFS network for the associated data chunks.

  3. Routing Mechanism:

    Using the extracted routing data from the ZIPP address, the request is directed to the correct zone or node likely possessing the necessary data. The router layer orchestrates this interaction, optimizing data retrieval.

  4. Data Retrieval:

    Data chunks are fetched from multiple IPFS nodes, as determined by the routing and content key. The decentralized design of IPFS ensures data redundancy and high availability.

  5. Local Reassembly:

    The client or extension reconstructs the data chunks in the correct order to reproduce the original content. Since the content is encrypted, the client uses the decryption key from the ZIPP address for decryption and subsequent display.

  6. Presentation to the User:

    The user is presented with the decrypted and reassembled content in its appropriate format.

6.2 Addressing System:

The address is pivotal in the ZIPP network. It's a comprehensive key that aids in routing, data retrieval, decryption, validation, and payments. Here’s a detailed breakdown:

  • Routing Information:

    This portion of the address aids in efficiently directing the data request to the right zone or node within the IPFS network.

  • Content Key:

    A unique identifier for the corresponding data chunks, ensuring that the correct data is retrieved from the IPFS nodes.

  • Decryption Key:

    All content on ZIPP is encrypted. Part of the ZIPP address serves as the decryption key, enabling secure content access.

  • CRC (Cyclic Redundancy Check):

    Essential for data integrity. If the CRC of the reassembled data doesn't align with the CRC in the address, it highlights potential data corruption or alterations.

  • Payment Address:

    Each ZIPP address contains payment information. The router, equipped with smart contract capabilities, distributes payments to nodes hosting the data, incentivizing the network's sustainability.

6.3 Hosting and Earning ZIPP

At the core of the ZIPP tokenomics is the principle of reciprocity. For users to store their data on the network, they must also contribute by hosting other users' data. This design encourages active participation and ensures a robust and resilient data hosting environment.

  1. 10x Redundancy Model: Users are required to host ten times the amount of their own data to be eligible for storing their data on the network. This 10:1 ratio serves multiple purposes:
    • It guarantees high redundancy, ensuring data is always available even if multiple nodes go offline.
    • It incentivizes users to contribute more to the network, enhancing the overall storage capacity and resilience.
  2. Earning ZIPP: Users earn ZIPP tokens as a reward for hosting data. The more data a user hosts, the more ZIPP they earn. This scalable reward mechanism encourages users to contribute even more storage resources to the network, beyond just the required 10x for their own data storage needs.
  3. Paid Option: For those who prefer not to host data themselves, ZIPP provides an option to pay for data storage using ZIPP tokens. This offers flexibility for users who want to utilize the network's storage capabilities without contributing storage resources. It also enables the users of the network accessing the data to pay for the content to be hosted too.

6.3.1 Data Preparation and Distribution

The ZIPP network prioritizes both efficiency and security when handling user data. To achieve this, ZIPP employs a multi-step process before distributing data across the network:

  1. Compression: The first step in preparing data for the ZIPP network is compression. The application on a user's machine compresses the desired contents using 7z, a format renowned for its impressive compression ratios. This not only reduces the overall data size, making it more manageable but also ensures quicker transmission times.
  2. Encryption: Post-compression, the data undergoes encryption to ensure its confidentiality. This step is crucial as the data will be distributed across multiple nodes in the network, and encryption ensures it remains inaccessible to unauthorized entities.
  3. Binary Splitting and Erasure Coding: After encryption, the data is split into fixed-size chunks using direct binary splitting. To provide redundancy and ensure data retrievability, even in scenarios where some nodes are unavailable or certain chunks are lost, erasure coding is applied. This process generates additional parity chunks, which assist in reconstructing the original data if necessary.
  4. Distribution: The final step is distributing these chunks to the user's local neighbors within the ZIPP network. These neighbors, or nodes, are responsible for hosting and maintaining the data, ensuring it's always available for retrieval.

6.4 ZIPP Staking and Trust Mechanism

  1. Staking for Hosting:

    • Nodes interested in hosting files stake ZIPP tokens as a commitment to their hosting responsibilities. These staked tokens are locked in a dedicated wallet.
  2. Trustworthiness & Earnings:

    • The amount of ZIPP staked directly correlates with a node's trust rank. The higher the stake, the higher the trust. Higher trust nodes are preferred for hosting, which means they have the potential to earn more ZIPP tokens as rewards.
  3. Redistribution Insurance:

    • The staked ZIPP acts as insurance. If a node fails to uphold its hosting duties for any reason (e.g., data loss, prolonged downtime), the system uses these staked tokens to cover the costs of redistributing the affected files to other nodes.
  4. Ensuring Data Availability:

    • Even if a node loses the hosted files, the system ensures data redundancy by storing multiple copies across the network. In the event of a failure, the system can quickly redistribute the data from another trustworthy node, ensuring uninterrupted availability.
  5. Dynamic Trust and Earnings:

    • Nodes can increase their trust rank and potential earnings by staking more ZIPP tokens. Conversely, if they face penalties due to non-compliance, their trust rank decreases, impacting their hosting rewards.
  6. Withdrawal & Unstaking:

    • Nodes can choose to stop hosting and withdraw their staked ZIPP after a predefined period, provided they have met all their hosting commitments. Any penalties incurred would be deducted from their staked amount.

By implementing this mechanism, the ZIPP network ensures accountability, data availability, and incentivizes nodes to maintain a high standard of service. It creates a balanced ecosystem where nodes are rewarded for their contributions and penalized for any lapses, leading to a robust and reliable decentralized data storage platform.

6.5 ZIPP Domain System

ZIPP introduces a unique domain system, leveraging the Shimmer network's capabilities to map domain names with the corresponding ZIPP address. This system simplifies the process of locating and accessing hosted data, making the ZIPP network more user-friendly and intuitive.

6.5.1 Domain Structure and Naming

Each domain on the ZIPP network will have a ".zipp" extension. This unique extension serves a dual purpose. Firstly, it helps users instantly recognize ZIPP-specific domains. Secondly, it enables seamless browser integration, allowing browsers equipped with the ZIPP addon to instantly differentiate between ZIPP and non-ZIPP addresses, thus streamlining content retrieval.

6.5.2 Paid to Live Domain System

To maintain the decentralized ethos and incentivize data hosting, domains within the ZIPP network operate on a "paid to live" model. When users or entities register a domain, they can add ZIPP tokens to keep the domain active and accessible. The accumulated ZIPP tokens are then distributed as rewards to nodes hosting the associated content, ensuring they are incentivized to maintain high availability and data integrity.

6.5.3 Redundancy and Domain Health Checker

With the ZIPP browser addon, users have the added benefit of a built-in domain health checker. This feature provides real-time insights into the redundancy levels of the associated content and estimates the remaining "life" based on the current ZIPP balance. Such transparency allows domain owners to proactively manage their domains, ensuring that content remains accessible and that nodes hosting the data are adequately compensated.

6.5.4 Conclusion on ZIPP Domain System

The ZIPP domain system is a testament to the network's commitment to user-centricity and decentralization. By blending traditional domain naming with a unique incentivization model, ZIPP ensures that the decentralized web remains accessible, rewarding, and seamlessly integrated with modern browsing experiences.

7. Intended Use and Compliance

ZIPP has been designed with a vision to foster decentralized communication for dapps, aiming to revolutionize the way applications interact and share information. We see ZIPP as an essential infrastructure layer for the decentralized web, empowering developers to create applications that champion privacy, resilience, and user autonomy.

Stance Against Misuse: ZIPP's primary purpose is to provide a platform for legitimate, transparent, and constructive decentralized applications and communications. We expressly discourage and condemn any use of ZIPP for illicit activities. Any indication or report of misuse will be taken seriously, and we will cooperate with authorities to address and rectify such situations.

Transparent Payment Ledger: The ZIPP coin transactions are recorded on a clear, transparent ledger. This ensures that all financial activities within the ZIPP network are open to scrutiny, further discouraging any potential misuse. By maintaining transparency in our payment system, we aim to build trust with our users and stakeholders.

7.1 Ensuring Ethical Usage and Network Safety

While ZIPP champions the ideals of security and anonymity, it is essential to strike a balance that ensures both ethical usage and the broader safety of the network. One of the primary means of achieving this is through the transparent ledger used for all ZIPP transactions. This transparency means that, although users benefit from decentralized and private data storage and communication, any financial transactions can be traced back to an exchange and, consequently, to a user's identity associated with a specific payment method.

Our commitment to transparency is twofold: First, it serves as a deterrent against illicit or harmful activities on the network. Those with malicious intent are likely to be dissuaded, knowing their financial transactions can be traced. Second, it establishes a foundation of trust and accountability. Users can be confident in the knowledge that content hosting payments are open for scrutiny, ensuring that there's no hidden monetization of the content they access or host.

By promoting this transparent approach, ZIPP aims to foster a digital environment where content thrives based on its merit. This ensures a minimalistic and free internet, where the primary goal is to keep valuable content alive, rather than profit-driven motives.

8. Distinctive Features of ZIPP

While ZIPP incorporates established technologies like IPFS and TOR, the platform introduces a unique blend of features that set it apart from existing decentralized storage solutions. Here's a closer look at what makes ZIPP stand out:

8.1 Temporary Storage with Incentivized Longevity

ZIPP introduces the innovative concept of temporary storage that's pruned unless it's "paid to live." Unlike many existing projects that focus solely on rewarding storage providers, ZIPP's model ensures data has a "lifespan" that can be extended through payments. This approach ushers in a dynamic, demand-driven storage mechanism where only data that's deemed valuable and sees active investment remains accessible.

8.2 Direct User Engagement in Data Longevity

The platform empowers users to actively contribute to the longevity of data. By enabling users (or data consumers) to directly fund data persistence, ZIPP democratizes the decision of what data is retained and what gets pruned. Such a system naturally ensures that data of significance, as determined by collective user interest, remains available on the network.

8.3 Dynamic Pruning Mechanism

ZIPP's unique pruning mechanism ensures efficient data management. Data is pruned based on its economic value, determined by the payments it receives, leading to an optimized use of storage resources. This ensures that only data actively valued by the community remains, while less significant data is automatically managed, reducing unnecessary storage overhead.

8.4 Holistic Integration

While ZIPP's foundational technologies might draw parallels with existing systems, the specific manner in which they are integrated, combined with the unique economic model around data longevity and pruning, establishes a distinct platform. By synergizing these technologies under a unified model, ZIPP offers a solution that's greater than the sum of its parts.

9. Conclusion

ZIPP represents an effort to contribute to the evolving landscape of decentralized internet solutions. With the foundational integration of IPFS and the initial use of Shimmer, combined with ZIPP's own contributions, the hope is to offer users a platform with an emphasis on privacy and data accessibility. The future direction, including the potential introduction of a unique distributed coin, will be shaped by the project's experiences and feedback during its early stages.

Divider

Roadmap

0%
Phase 01

Initiation

Foundational groundwork for ZIPP.


  • Release website
  • Whitepaper release and initial community engagement
25%
Phase 02

Development

Building the core functionalities and ecosystem.


  • Begin development of the core ZIPP platform
  • Recruitment of additional developers and community managers
  • Development and testing of integrated apps
Divider

Team

Lance Edward

Lance Edward

Director of Code and Creativity
John Mann

John Mann

Director of Sales and Stories
Divider