What is it about?
The project solves the problem of leakage of protected information when working on the Internet. By protected information here we mean all types of confidential information (personal, commercial, professional and other types of secrets), as well as any data and metadata posted by users privately (not for public use) in the Internet information systems (ISI), or generated by their actions when using the ISI or accessing the ISI (digital footprint). By user, we mean both individuals (subscribers) and organizations. Organizations are made up of internal subscribers (organization subscribers). We consider leak channels: 1. Owners of the ISI (Except for the case when the user himself is the owner of the ISI); 2. The personnel of the ISI owners. This staff is divided into two subtypes: 2.a Personnel whose work requires direct access to protected information for the performance of labor duties (For example, a sales manager needs access to data on previously completed transactions and the customer base); 2.b Personnel whose work does not require direct access to protected information, but this personnel has access. This is, as a rule, technical staff (For example, a database administrator who maintains a DBMS containing data on previously completed transactions and customers does not need access to this data, but, in fact, he has such access); 3. Internet providers and telecom operators that provide data transfer from the subscriber to the ISI and their personnel; 4. Operators of cloud services and Web hosting ISI and their personnel. Leak channels can be formed both as a result of intentional actions and as a result of errors, for example, when configuring information security systems, administering a DBMS, etc.
Featured Image
Photo by Tarik Haiga on Unsplash
Why is it important?
The mission of TheOoL DAO is to assure the rights and freedoms of online users as declared in the Universal Declaration of Human Rights, namely the right to privacy, the right to protection from prosecution on political, religious or any other grounds, and the right to access online data by way of technological elimination of any third party censorship.
Perspectives
Read the Original
This page is a summary of: Secure serverless internet (TheOoL.net), January 2023, American Institute of Physics,
DOI: 10.1063/5.0125509.
You can read the full text:
Resources
TheOoL DAO
DECENTRALIZED AND SERVERLESS SECURE WEB HOSTING CLOUD COMPUTING AND PAYMENT SYSTEM
Ensuring the security of using virtualization to protect data on the example of a peer-to-peer decentralized network TheOoL.net
Virtual workspaces are often used in modern information systems. Due to its technical features, such as no direct access to hardware, access balancing, instant migration, and much more, this technology has proven itself well in the field of information security. However, the possibility of obtaining secret data from the virtual workspace by introducing malware (for example, spyware) on the user's host, as well as the vulnerabilities of the virtual spaces themselves, remain quite serious problems. Various internal regulations or technologies used to ensure an adequate level of security may not be effective enough. Using the approach to ensuring the security of virtual spaces in the TheOoL.net system as an example, the author examines the use of a number of technological features to close the vulnerabilities of such systems.
Mathematical Model of Billing for TheOoL DAO
The paper discusses the current state and development prospects of Web3 and decentralized autonomous organizations in comparison with Web 2.0. The problems of interaction between participants of decentralized autonomous organizations within the virtual space and integration of a decentralized autonomous organization with the outside world through network inducement algorithms are raised. The possible implementation of such interactions is considered on the example of TheOoL DAO. The functionality of TheOoL DAO is briefly disclosed, aimed at ensuring the security of participants in a decentralized autonomous organization, the complete suppression of the "digital footprint" they leave. The classes and forms of financial relationships of participants in a decentralized autonomous organization are determined. A mathematical model of billing in the serverless secure Internet TheOoL DAO on smart contracts is presented as an integral part of the TheOoL cloud computing and data storage subsystem. This system provides guaranteed automatic payment for services for the provision of computing power for storing and processing data or performing computing tasks and, at the same time, performs the functions of fully automatic control over the execution of the terms of a smart contract by the owners of these capacities. The presented billing system blocks the transfer of personal information between the customer and the service provider, which ensures the privacy and security of the execution of smart contracts.
VIDEO CONFRENCING SUBSYSTEM OF SECURE SERVERLESS INTERNET
The article discusses the prerequisites for creating a private serverless Internet with a built in secure video and audio communications subsystem with the possibility of holding conferences of three or more participants. A brief description of the principles underlying the private serverless Internet architecture, which, in addition to the overlay data transfer protocol, includes serverless hosting, cloud computing, serverless search engine, and an integrated payment system, is given. A simplified graphical model of the architecture and operation of a serverless supersecure video and audio communications subsystem with the main operation modes and methods of ensuring the security and confidentiality of negotiations and correspondence is presented.
Model of the peer‐to‐peer distributed system for securable information storage and processing without traffic prioritization (TheOoL project)
The mathematical model “Peer-to-peer distributed system for securable information storage and processing in enterprise networks” is described hereinafter. It is a versatile distributed operating system designed for the protection of distributed computing and insulation of private networks without restricting the possibilities of effective interactions, cryptographic security, protection from unauthorized access with the application of biometry and an innovative protocol of data exchange for topology control based on distributed ledger technology. The modeling was performed with the purpose of evaluation of performance of the system depending on productivity of the hardware of its nodes and the network’s telecommunications equipment.
The Economics of Introducing the Peer-to-peer System of Storage and Processing of Protected Information at an Enterprise
The method of evaluating the effectiveness of the economic parameters for the implementation at industrial enterprises of “Peer-to-Peer Distributed Storage and Processing of Protected Information in Corporate Networks,” designed primarily to protect distributed computing and isolate private networks without limiting the possibilities of useful interaction in the framework of the technologies Industry 5.0 and Super Smart Society is proposed. Within the framework of these concepts, there is a gradual integration of production, logistics, sales, and information systems into a global information exchange system. The proposed system provides for effective counteraction to the threats using cryptography, protection against unauthorized access using biometrics, and an innovative protocol for information interaction and control of topology based on distributed ledger technologies, it optimizes the use of computing power and provides tools for distributed computing without changing the logic of existing software.
EFFICIENCY OF THE IMPLEMENTATION OF THE PEER-TO-PEER DISTRIBUTED SYSTEM FOR SECURABLE INFORMATION STORAGE AND PROCESSING (THEOOL PROJECT)
methodology of evaluation of efficiency of the implementation at industrial enterprises of “peer-to-peer distributed systems of storage and processing of protected information in enterprise networks” has been proposed. The efficiency evaluation is based on the comparison of the indicators of reliability, fault tolerance, and total cost of ownership of the implementation of corporate information systems within the proposed system and its possible alternatives. The “peer-to-peer distributed system of storage and processing of protected information” is designed for the protection of distributed computing and incapsulation of private networks without restricting possibilities for usable interactions in the process of implementation of Industry 5.0 and Super Smart Society technologies. When these concepts get implemented in an enterprise, manufacture, logistics, and sales are merged into a global geographically and organizationally distributed information system for data exchange, which functions on top of the Internet. The proposed system offers tools for setting up distributed computing, and it ensures an effective response to threats by applying cryptography, unauthorized access protection with the use of biometry and an innovative protocol for information exchange and control of topology powered by distributed ledger technology, while also optimizing the utilization of computing capacity.
Q&A With the Oracle of Liberty
Q&A With the Oracle of Liberty
TheOoL DAO: Web3 Darknet
TheOoL DAO Web3 Darknet: Decentralized And Serverless Sec...
Четыре инновационных проекта Самарской области получат 16 млн рублей на развитие
Четыре инновационных проекта Самарской области получат 16 млн рублей на развитие
TheOoL Project Web-site
TheOoL DAO is a super secure distributed information ecosystem that provides users with private space and the ability to transact without leaving their ‘digital footprints’ on the internet. We provide high speed services of secure and distributed cloud computing and cloud storage at optimum prices. Resource providers and content providers are able to securely and automatically trade in computing resources and information. And our ecosystem makes private payments fast and secure. TheOoL DAO offers decentralized web hosting services with a serverless security and content control system on its private, secure distributed cloud for data computing and storage. The ecosystem’s economics is underpinned by smart contracts executable in our decentralized payment system.
TheOoL.net Intro
Today’s Internet, because of its initially open infrastructure, provides ample opportunities for both violating privacy and spying on users and for restricting their access to information, as well as imposing particular models of political and economic behavior. The Internet allows for prosecution of people on the grounds of their political, religious, national, racial, and gender identity.
TheOoL Data Transmission and Storage Protocol (TheOoL DTSP) demo
Our Chief Technology Officer Alexander Tolstenko demonstrates how to work TheOoL DTSP. TheOoL DTSP is an important part of the web that is responsible for placing data in our serverless storage and delivering it to an interested reader. We apologize to the English speaking audience. Alexander speaks Russian. Later we will equip the video with English subtitles and full English text in the description.
Contributors
The following have contributed to this page