Question1: What is Tachyon Protocol?

Tachyon Protocol is a decentralized internet protocol.

Tachyon Protocol is a blockchain-based network stack combining decentralization and encryption techniques; it is designed to reconstruct the TCP/IP stack by means of decentralized structure, end-to-end encryption, traffic concealing, multi-path routing, and multi-relaying scheme. Basically, it takes today’s TCP traffic and carries it over a modern, reliable multi path UDP scheme.

Tachyon Protocol comprises of the following parts:

- Tachyon Booster UDP — By using DHT, UDP, real-time optimal routing, and a blockchain token to incentivize high speed provider nodes, it is capable of 200%~1000% transmission acceleration and over 90% connection success rate in heavily restricted network environments based on the experimental data.

- Tachyon Security Protocol — an end-to-end encrypted content security protocol that provides real-time protection against man-in-the-middle attacks (MITM), as well as other security issues.

- Tachyon Anti-Content Analysis — Enhances network anti-monitoring capabilities through concurrent multipath routing and a relay forwarding scheme

- Tachyon SDK — be easily integrated and instantaneously deployed with all popular programming languages for integration with both new and existing software. The Tachyon SDK has applications in decentralized finance, blockchain, and network security.

Tachyon protocol will bring new levels of security to today’s Internet. We are bringing users privacy, security, speed and freedom.

Question2: What can we do with Tachyon Protocol? Why do we need a decentralized VPN?

As a fundamental internet protocol, Tachyon Protocol can be used in many fields, including VPN, IOT, DeFi, Storage, CDN, DNS, etc. — jointly this will create an extensive ecosystem with many use cases and applications.

With Tachyon, every single piece of data you transmit daily on the internet will be decentralized, and encrypted, including your bank information, browsing data, files, pictures, and social media, etc. You will have full control over your data, without having a middleman, so everything will be safe and secure, and you can finally enjoy real in-transit data privacy.

Question3: Why you choose VPN as your first product?

Our team has been focusing on issues of online privacy and data security for over 5 years. After studying a variety of factors, techniques and technologies, we think decentralized VPN will be the first revolutionary step to achieve internet privacy, and that’s why we created Tachyon Protocol.

Tachyon Protocol has been tested in production for a long time. Its successful and stable performance has given us the confidence to take a further step towards decentralized VPN.

There are 900 million VPN users around the world. They have urgent needs for privacy protection, network security and freedom. Compared with traditional network protocols, Tachyon Protocol has obvious advantages in these areas. These features are very suitable for landing on VPN scenario; Tachyon Protocol’s technology in communication protocols comes from mature products. They have accumulated technical experience and channel influence in the VPN industry. We think this is the best choice; Decentralized VPN is not a new concept but no one could build it until now because the key problem is not solved. We all know Blockchain can bring real privacy & security to the VPN market, but how to combine these two to reach the perfect result? Our answer is Tachyon Protocol. Only improving the fundamental internet protocol, solving the key problem from the origin, can a decentralized VPN be realized. This is what makes Tachyon VPN different from other similar projects.

Question4: It is a revolution in our information daily life, the next generation of internet. But when can we use the product?

Tachyon Protocol’s innovations are as follows:

1. Using PPPoIP, DHT and other mature distributed technologies to transform the TCP/IP model, using UDP as the transport protocol of the Transport Layer, thus making the transmission network stable. And the transmission efficiency has been improved 200%~1000%.

2. Using the multi-protocol adaptive infiltration technology that has been verified by 50 million users to identify the network environment, select available protocols, and increase the network connection success rate in highly restricted network environments to over 90%.

3. On the TCP/IP model, using end-to-end combined encryption, protocol simulation and other innovative technologies to disguise the transmission data as other types of data, such as disguising the IP package that sends an email as accessing Google’s IP Package, improve the security of data transmission, prevent data feature leakage, and improve the difficulty of Firewall/Filter identification.

4. Using concurrent multi-routing scheme and multi-relay forwarding scheme similar to Onion network to improve the difficulty of capturing and deciphering information.

5. Providing an easy-to-implement SDK to open the Tachyon Protocol to other projects.

As can be seen from the roadmap, Tachyon Protocol gradually covers users in gray testing manner, so that it can take advantage of existing technology accumulation and provide reliable service for users with new technologies in a relatively stable anner. Our team has focused on the online privacy & privacy problem for over 5 years. The concept of Tachyon Protocol has been tested for a long time. The successful performance gives us the confidence to get a further step in decentralized VPN.

According to the latest news, the team will release a CLI version of Tachyon VPN in November. And we expect to complete Tachyon’s first commercial use scenario in Q1 2020 and enable Tachyon VPN to be used by its first 1 million users.

Tachyon VPN will bring ultra cost-effective solutions that ensure advanced cybersecurity and privacy protection for all users.

Question5: Can you talk more about the development team of Tachyon Protocol?

Since 2016, the Tachyon and V SYSTEMS teams have been collaborating and sharing R&D in order to find viable technical solutions for aging TCP/IP stack. We share the same vision: to improve fundamental internet infrastructure technologies and find a solution to online privacy & security.

This collaboration marks a great significance to both V SYSTEMS and Tachyon teams. As the first project to be built in the V SYSTEMS ecosystem, Tachyon Protocol will bring millions of users onto the V SYSTEMS network. At the same time, V SYSTEMS will provide technologies and sources needed to create a scalable blockchain DApp.

Tachyon Protocol is a marriage of the high-performant underlying support of V SYSTEMS, the rich operational experience and talent advantage of the encryption community, and the rich technical experience and channel influence.

Tachyon Protocol is expected to be driven by community organization, so we do not adopt the traditional corporate governance structure, but are led by a five-member committee. All members of the committee have rich experience and unique skills in blockchain technology. Sunny King is the inventor of PoS consensus mechanism, three members have been CEOs or leaders of a project or entity, they are familiar with the blockchain, financial technology, investment , Token Economics, decentralized technology and project management.

We also have top database experts and brand marketers from V SYSTEMS, senior development engineers, marketers and product operators from VPN industry.

Question6: What is the IPX token, what is the utility of it?

The IPX token is a blockchain token residing on the V SYSTEMS blockchain network. The token provides an easy, affordable means of sharing spare bandwidth of the nodes, with the aim to strengthen stability and growth in the network. The introduction of appropriate token economics will promote the development of the network, and solve major problems with the topology of the decentralized Tachyon network and serve as a proxy to the valuation of the overall system.

The utilities of IPX token includes function as below:

Identity verification for provider nodes. This is essential to the security of Tachyon Protocol Network, as without token for identity verification, the malicious nodes can easily monitor the traffic and undermine the security of the network.

Another purpose is that the token serves to ensure the network is driven by the community participants, and not the Tachyon funding team, which will prolong the vitality of the project.

The IPX token can be used for both trading and store of value. The IPX token enables the Tachyon market to operate by means of pre-session locking, instant checkout and session fee collection. Without a token, we cannot resolve Sybil and Eclipse attacks which would result in the whole network being rendered inoperable.

As an important part of incentive and coordination mechanism, the IPX token is also crucial to the expansion of the network boundary the development of the Tachyon ecosystem. Without a token, nodes are not incentivized to join the network, resulting in the inability to produce value for other business scenarios and settlement.

Question7: What is the economic model of IPX?

The initial supply is 1 billion.

In order to encourage more nodes to join Tachyon for network construction and community governance, and ensure decentralization and self-development of the network, we will issue an additional 5% per year to motivate the Provider Nodes for a decade.

Tachyon Protocol provides market for trading bandwidth for VPN nodes in the network.

If network users need to use traffic, they can send demand and expected transaction price to DHT Routing.

DHT Routing matches the user with Provider Node based on the latency, packet-loss, bandwidth, and credit of providers in the network.

The user establishes payment channel with Provider Node, and puts the equivalent token in the payment channel to be locked, while Provider Node provides bandwidth for the user.

After the session ends, Payment channel transfers the tokens to the Provider Node according to the transaction amount confirmed by both parties.

Token quantitative analysis, IPX token supply and demand dynamics are related to the following factors:

Demand from new provider nodes which want to join the network

Demand from users who want to use the network

Supply from the provider nodes who sell their session fee profits

Supply from the provider nodes who sell their staking profits

Other market dynamics resulting from temporary gaps in supply/demand and speculative activity of traders.

From the demand supply analysis of IPX Token economic model internal recycling, we can draw the following conclusions:

IPX Token has endogenous value growth logic:

The increase in the number of users means that the demand for traffic increases;

More traffic provider nodes are attracted to join the network;

The number of Tokens that can be circulated in Tachyon Protocol network is reduced;

According to the velocity of money formula: M (money supply) = Q (quantity of goods for sale) * P (price of unit commodity) / V (velocity of currency circulation of the same name) , assuming Q becomes larger; P remains stable; V may become smaller due to increased internal demand of the network and the increased number of staking needs, then M becomes larger. If the actual increase in the network does not surpass the demand M, then IPX Token forms relative deflation, and the purchasing power of IPX Token increases.

Consistent with the logic of international exchange rate, from the perspective of the external network, due to the increased purchasing power of IPX Token, the demand for Token outside the network increases, but the actual Token supply decreases, so IPX Token appreciates against other currencies.

2. With the increase of users and transaction frequency, IPX Token has the internal appreciation power

3. In the future, with the ecological settlement of data storage, CDN, DiFi, instant messaging, edge computing, games, etc., the increase of usage scenarios will further promote the value of IPX Token.

Question8: What is Tachyon Protocol mining? How to mine IPX token?

Different from traditional mining, Tachyon Protocol mining refers to sessions between provider nodes and clients. In a session, the former provides traffic to the later. The users can submit a wallet address on our website, with a minimum of 20,000 IPX Tokens, remaining the wallet balance unchanged for 14 days to decrease the price fluctuation. As for staking, we can actually give rewards to those who contributed to the network, which secures the system and expand the audience.

Tachyon Network will come online in the next month and it will be driven by the community. In order to ensure the smooth launch of the network, pre-minting is now open. The provider nodes can get staking rewards and tickets to register as a full IPX token by submitting the wallet address. The session rewards will be given in the near future.

As the first highlighting project building on the V SYSTEMS mainnet, Tachyon has laid the foundation for its blooming DeFi ecosystem. In order to promote user engagement and participation, we welcome the VSYS community to join in fruitful collaboration with the project through our Staking 2.0 initiative — all VSYS coin holders will be able to stake not only VSYS coins, but also IPX tokens. In the future, Staking 2.0 will expand to more projects built in the VSYS ecosystem.

The reward scheme for Staking 2.0 is very simple. 10% of IPX token (1 billion) will be allocated to reward VSYS users who participate in staking. And The system will distribute the pool of IPX token to supernodes daily, for a total of two years. More details about Staking 2.0 will be announced soon. Please stay tuned to Tachyon and V SYSTEMS’ official social media platforms for news and updates.

Question9: What is your listing plan?

Here I want to take this opportunity to thank Bithumb Global for recognizing IPX as one of the featured projects in 2019. We will continuously strive for more listing opportunities on other top exchanges, and focus on the advancements of technology.

We are so grateful Bithumb Global opens up more opportunities for people to

Know Tachyon Protocol. Through the listing of top exchanges, we hope to drive the exposure of IPX tokens and expand the user community, in order to accelerate the adoption of Tachyon technologies.

Question10: What are the advantages of Tachyon Protocol over similar projects?

We have solid product and community backed by XVPN, strong technology support by co-developing with V SYSTEMS and co-designed by Sunny King, inventor of proof of stake. XVPN users will transform to the next generation platform, so this product will have a large number of users and coin holders in the future. The tachyon protocol vpn product is almost ready to launch, so we are much more solid. Backed by V SYSTEMS team which is top 40 coin on CoinMarketCap, the IPX token will grow to become one of the global popular crypto.

Question11: VPN is just one example of the Tachyon protocol, and there will be more use cases in the future, so if you have the next product you’re working on, please take a intro.

We will follow up to launch storage, CDN based on Tachyon Protocol. We believe the two markets are all billion dollar market in 2020–2021, which will bring hundreds of millions of users to Tachyon Protocol. But in the long run, we will open to third party to build more decentralized application based on Tachyon Protocol, it will help us bring more innovation of blockchain to the world.