PRIVATE NETWORK
Spectralis
Private Network.
The Spectralis Private Network is a private network that combines elements of technologies such as TOR, VPN, and VOBP to secure connections, traffic, communication sessions, data transfers, and devices.
The Spectralis Private Network is a private network that combines elements of technologies such as TOR, VPN, and VOBP to secure connections, traffic, communication sessions, data transfers, and devices.
Open your Hotspot through your Minter Guardian, pair multiple devices to increase your total validation power, and receive higher rewards.
Spectralis is a network that forms an internet layer of virtual tunnels that allows you to improve your privacy and security on the Internet. It works by sending your traffic through three random servers (relays) within the network. Thus, according to user needs, each device is an intermediate point of information transfer or an exit relay.
Users with Xiden registered devices can connect automatically to any Spectralis Hotspot without being prompted for administrator permissions (username and password). Any device not registered in the network can connect to the Hotspot if it has administrator permissions. Any Hotspot-connected devices regardless of whether it is registered in the network or not will benefit from the network’s features.
SPN is a public network built to facilitate the integration of user-owned devices, therefore, one of its main benefits is that all the nodes are owned by the community. The users that own an SPN Hotspot offer the chance to other people to benefit from the network’s features. Through this, the community shares resources in the network and is an active part in the long sustainable development of the system.
Users with registered devices can automatically connect to any Hotspot whenever they are in range, without being prompted for a username or password.
A SPN’s key attribute is the provision of privacy for all network users through the Matrix Id protocol and it protects the identity of the connection provider and the users who are part of the connection.
The SPN’s implemented protocol allows the opening of a connection only after an exchange of P2P encryption keys has been successfully completed between switches.
Combines elements of TOR and VPN architectures to anonymize and protect the sources, traffic, and entities that are used as relay Nodes within the network.
It uses the VOBP architecture and cryptographic algorithms to encrypt connections between devices and the Hotspot.
Opens a direct communication session between the initiator device and every network relay, including between all the network relays. Traffic and sessions encryption keys are generated by the initiator device.