VPN Reimagined


The Ghost Network is a logless, peer-to-peer, blockchain VPN service that consists of a collection of distributed VPN server nodes owned by consumers and organizations both big and small. The network facilitates secure VPN connections between clients and servers by algorithmically plotting routes taking into account quality, speed, and data size.


 

Distributed Architecture

The Ghost Network has a distributed or ‘mesh’ topology making it fault-tolerant and resistant to widespread system changes or outages meaning less down time. In the case of databases, distributed systems assure that not all of your eggs are in one basket. Distributed systems also allow for real-time route optimization since there are so many ways to get from one node to another instead of just one pre-defined path. Probably the most crucial benefit of a distributed network is the lack of a central network authority, a single point of trust. Rather than have to trust a particular VPN company or ISP to not snoop on their data, clients can simply trust the nature of the network to keep their data safe.

 
network-3537400_1920.png

A Grassroots Network

tree-990859_1920.png

Each Ghost router doubles as a VPN server as part of the greater distributed Ghost network that spans across the Ghost ecosystem. The consequence of which is a truly interconnected web where bandwidth is crowd-sourced. The network is designed so that as more servers are introduced to the network, the faster, more secure, and stable the network becomes. In order to incentivize running a Ghost VPN relay server, blockchain technology manages and enables the leasing of bandwidth by individuals in exchange for a tradable crypto-token.


Real-Time Payments

Rather than employ a subscription model to control network access and to ensure a continuous revenue stream, the Ghost Network will serve as a real-time payment platform where transactions are calculated per connection taking into account quality, speed, and data used. All transactions will occur anonymously using rotating cryptographic pseudonyms directly between Network Clients and Service Providers.

arrows-2029165_1920.png