What is NKN?
NKN stands for a “new kind of network”. The goal for the project is to create a new kind of internet. A more decentralized one, where people have full control over their data and can freely communicate with each other without needing a centralized intermediary.
The NKN network uses blockchain tech in order to create this peer-to-peer network, which will allow for the secure (and efficient) transfer of data.
NKN vs The Current Internet
A new, more decentralized version of the internet is exactly what we need! The version of the internet we’re using today is way too reliant on centralized infrastructure which is owned and controlled by a small number of large companies.
We’re in a battle of centralization vs decentralization at the moment. There are power-hungry people who want to consolidate their control, and there are libertarian-minded developers who are working relentlessly to build good tech that gives freedom to the people.
The current state of the internet is vulnerable to censorship (look at China and North Korea). It’s also vulnerable to surveillance and data breaches. The developers at NKN are trying to solve these problems.
With NKN, data isn’t transmitted and stored via centralized servers. Instead, it’s done via users’ devices.
In the NKN network, each node (or user’s device) acts as both a sender and a receiver of data. When a user wants to send data, the data is encrypted and sent to multiple nodes on the network as opposed to a single centralized server. The nodes on the network then forward the data to the intended recipient, creating a decentralized and resilient network that is resistant to censorship and surveillance.
Another important aspect of the NKN network is its unique consensus algorithm called Cellular Automata (CA). This algorithm allows for highly efficient and scalable network communication and is resistant to Sybil attacks.
Note: A “Sybil attack” is when someone creates multiple fake identities or nodes in order to gain control of the network.
How Cellular Automata Works
The novel “Cellular Automata” algorithm that NKN uses allows for highly efficient and scalable network communication. This algorithm is based on a unique voting process that requires token holders to vote on new blocks.
In traditional consensus algorithms, like “Proof of Work” and “Proof of Stake“, a group of nodes called “miners” are responsible for validating transactions and creating new blocks. These nodes are typically selected based on either their computational power (as in the case of proof of work), or the amount of tokens they hold (as with proof of stake).
The “Cellular Automata” algorithm used by NKN, however, allows all nodes on the network to participate in the consensus process, regardless of their computational power or token holdings. This is done by using a virtual grid that imitates how cells act in living organisms.
To simplify that concept, picture the ‘virtual grid” as being similar to a chess board. Each node on the network is represented by a “cell” on the grid. The state of each cell is determined by the vote of the cells surrounding it. Just like in a game of chess where the movements of each piece are determined by the pieces surrounding it.
This way, every cell has a say in the final outcome and the decisions made on the network. This is an efficient and decentralized way to reach consensus that allows all nodes to participate in the process, rather than relying on a small group of powerful nodes.
In order to create a new block, nodes on the NKN network must vote on the proposed block. The proposed block is then broadcasted to the whole network, and each node has the opportunity to vote on it. The vote of each node is based on the state of its neighbouring cells, and the vote is passed along the network, like a wave, until it reaches a consensus.
Once a consensus is reached, the block is added to the blockchain and the nodes that participated in the voting process receive a reward in the form of NKN tokens.
What Sort Of Applications Have Been Built On The NKN Network So Far?
Currently, several applications have been built on the NKN network that utilize its decentralized infrastructure, here are a few examples:
- NMobile: A decentralized, Telegram-like messaging application that allows users to send text, voice, and video messages. You can make private voice and video calls with it as well.
- NCDN: A decentralized Content Delivery Network that allows users to earn NKN tokens by sharing their unused bandwidth and storage to distribute content.
- dataRide: A decentralized platform as a service (PaaS) solution that offers fast, reliable, secure and low cost messaging and streaming services.
- NVPN: A decentralized Virtual Private Network that allows users to securely access the internet without the need for centralized VPN providers.
- NKNx: A decentralized exchange that allows users to trade NKN tokens and other cryptocurrencies using the NKN network.
Who is behind the NKN project?
Creating a new version of the internet is a big task, requiring a strong development team. There have been other projects that have claimed to be doing something similar (like Substratum, for example).. only to fail and cause token holders to lose their investment.
Well, the NKN project certainly has some noteworthy contributors with the technical prowess to actually make it happen.
The co-founders of NKN are Yanbo Li and Bruce Li. Yanbo Li is a computer scientist with a PhD from Northwestern University. He has experience working at companies like Nokia Bell Labs and Qualcomm. He was also a co-founder of a blockchain company called Onchain, which is the parent company for a popular project called NEO.
Bruce Li has a background in electrical engineering and previously worked at Nokia Bell Labs, where he focused on networking and telecommunications.
Overall, the NKN team consists of over 30 members, including developers, researchers, and advisors.
And speaking of those advisors, it seems as though they’re tapping some of the most brilliant minds in the space.
One of the key technologies that makes Bitcoin and cryptocurrency in general even possible is called Public Key Cryptography. Well, one of the inventors of that technology is a man named Whitfield Diffie. He’s a touring award winner, and yes.. he’s a close advisor for the project.
Another advisor lending their expertise to the NKN dev team is Dr. Stephan Wolfram, who is also a touring award winner. He was won several other awards as well for his contributions to science and technology.
What is the use case for the NKN token?
The NKN token is the native cryptocurrency of the NKN network and is used for a variety of purposes, including:
- Node operation: Nodes in the NKN network need to stake NKN tokens to participate in the network and perform various tasks, such as relaying data, routing traffic, and serving as consensus nodes.
- Network services: Developers can use NKN tokens to pay for various services provided by the NKN network, such as data transmission, file storage, and content delivery.
- Incentives and rewards: The NKN token is used to incentivize node operators and users to contribute to the network by performing tasks and providing resources. Nodes and users can earn NKN tokens as rewards for their contributions.
- Governance: NKN token holders can use their tokens to participate in network governance, such as proposing and voting on network upgrades and changes.
Overall Thoughts On The Project
We can have all this great technology that enables decentralization, but the internet itself is centralized and controllable – and perhaps put behind some sort of digital ID – well, that’s a serious problem. The internet needs to be open for everyone, and untouchable to authoritarian governments throughout the world who may want to tamper with it.
If you browse through the WEF website (the puppet masters for the politicians), they don’t hide their desire to get people plugged into a digital ID system. It’s the perfect control mechanism, and of course they want it to be a requirement to access certain websites (and likely the internet in general).
If they foment some sort of “cyber attack” to provide the justification for the new requirement, then a large segment of the population will be looking for alternatives.
If the NKN team can deliver, and do so in a way that aligns with individual freedom, then the growth potential of this project will be absolutely massive.