👁Data transfer in Utopia.

Utopia P2P
2 min readJul 12, 2021

--

🛡Strong 256-bit encryption ensures that the contents of data packets sent over the Utopia network are not read by any outsider. However, even not decrypted packets can provide too much information — for example, they can be used to track the sender and recipient of messages, as well as their activity. To solve this problem, Utopia implements a unique data transfer mechanism.

⛓All data sent in the Utopia ecosystem is naturally split into packets, each of which is then sent to the recipient independently. However, in Utopia, packets are sent each by their own route, passing through many intermediate nodes, so the file is already collected from the recipient.

🕵️‍♂️Many projects use this approach. However, in Utopia, the routing changes dynamically — the route of an already sent packet can be repeatedly changed before it reaches the destination. Moreover, each packet that passes through the intermediate node changes its routing settings, taking into account the network load. As a result, not only does it ensure complete untraceability of packets, but it also reduces the load on the network-packets “avoid” overloaded network segments.

👥However, Utopia’s measures to ensure anonymous data transmission are not limited to this. The network constantly generates and transmits “garbage” TCP packets, their only task is to mask the transmission of real data packets, ensuring that even if the network temporarily decreased the volume of traffic, it will still be impossible to track files and messages — the movement of packets will be covered by a “smoke screen”.

Website: https://u.is/
Download: https://u.is/en/download.html
Telegram: https://t.me/utopiaP2Pofficial
Twitter: https://twitter.com/UtopiaP2P
Youtube: https://www.youtube.com/channel/UC8NDF3CeWCqRo2vKmMVQX_w
Bitcointalk ANN thread: https://bitcointalk.org/index.php?topic=5286191.msg55504061#

--

--

Utopia P2P
Utopia P2P

Written by Utopia P2P

Welcome on Utopia’s board! Utopia p2p is an anonymous and decentralized p2p network with built-in secure tools. No surveillance, censorship and data leaks.

No responses yet