How it works
The Sylo Network is composed of application level nodes running the Sylo Protocol and a consortium of Sylo Nodes that facilitate the user experience demands of our modern world. Sylo Nodes provide the means for peer discovery, NAT traversal, message relay, and asynchronous data storage. Within the network, Sylo Nodes are incentivised to provide these necessary services to nodes (users). This prevents applications built on the Sylo Protocol from relying on external infrastructure, either provided by a third party or established by nodes themselves. The Sylo Node Market is built around a probabilistic payment system. When nodes require services from the Sylo Network, they purchase it from Sylo Nodes using payment tickets. Each ticket has a probability of winning ERC20-compatible Sylo Tokens.
As nodes consume services, the majority of the transactions occur off-chain, directly between a peer and a Sylo Node. In this way, the payment system is able to scale massively and allows payments to be exchanged for extremely granular levels of service.
Sylo Nodes
A Sylo Node is an application suite that you can run at home on a computer that is on 24/7. You can also run a Sylo Node on your own cloud server. Your Sylo Node contributes to the Sylo Network and earns micro-payments of Sylo Tokens (SYLO) for doing so.
Sylo Node operators stake Sylo Token via the Sylo Smart Wallet. This acts as collateral to ensure that they act honestly and fairly. The act of staking announces their Sylo Node’s presence as infrastructure contributors. Sylo Nodes provide the means for peer discovery, NAT traversal, message relay, and asynchronous data storage on the Sylo Network.
Sylo Encryption
All messages, voice calls, video calls, and file transfers on the Sylo Platform are end-to-end encrypted, which means only you and your intended recipients can see the content of what is sent.
Sylo follows the first rule of cryptography:
'Don’t roll your own crypto.'
This rule implies that instead of writing your own cryptography protocols, developers should “use published, public, algorithms and protocols.”
Cryptography is a very complex discipline and extremely important to implement correctly; one small error could open up a back door to exposing important, private information.
Therefore, the Sylo Smart Wallet uses the Signal Protocol for chat messages. The Signal Protocol is an open-source cryptographic protocol with end-to-end encryption.
“The protocol provides confidentiality, integrity, authentication, participant consistency, destination validation, forward secrecy, post-compromise security (aka future secrecy), causality preservation, message unlinkability, message repudiation, participation repudiation, and asynchronicity.”
- Wikipedia on Signal Protocol
File transfers in the Sylo Smart Wallet also use the Signal Protocol. Having forward secrecy and end-to-end-encryption, meaning only your contact can ever see what you send.
The Sylo Smart Wallet also uses the WebRTC (‘Web Real-Time Communication’) open-source library for real-time voice and video communication. WebRTC has security as a major focus, encrypting all data (voice and video) that goes through it, while also requiring the Sylo Smart Wallet to encrypt signalling messages that connect contacts when they want to call.
The Ed25519 public-key pair scheme is used for all other general messaging signing - anything other than chat - that is sent by a user’s device. Ed25519 digital signatures prove authorship over any content a user sends.
Sylo also follows the number one rule of cryptocurrency:
'Your keys, your crypto.'
This rule refers to the fact that if you do NOT have your crypto wallet keys, YOU do not actually have control of your cryptocurrency and/or wallet assets — whomever has your keys owns everything.
The Sylo Smart Wallet develops this a step further in that only you own your keys, only you own your chats, only you own your contacts, cloud files, and dApps too! You are your own bank, Sylo simply helps you to access your encrypted private vault with your key that you control.
The Sylo Network is built to enable users’ devices to connect directly (peer-to-peer) whenever possible, which means there is no ‘middle man’ snooping, other than the global internet infrastructure needed to send data.
Sylo Nodes exist to help users connect directly, store encrypted data (they cannot read it) when a user is sent something while they are offline and will relay encrypted channels when a user’s device is in a restricted networking environment (most common when using mobile internet).
Sylo Token integration
Sylo Nodes receive payments for their services in the form of 'layer two' probabilistic micro-payment tickets. As an anti-spam mechanism, Sylo Nodes must stake Sylo Tokens in order to begin providing services. User’s accounts can stake themselves or they can be staked on behalf of someone else via stake gifting.
Sylo Network users can also use the Sylo Token for spending on optional, additional services provided by Sylo Nodes.
Whitepapers
The Sylo Protocol
This paper presents a decentralised,
peer-to-peer communication protocol upon which powerful decentralised applications can be built.
Read About The Sylo Protocol
Network Incentivisation
This paper presents a secure, scalable, incentivised peer-to-peer network which fairly rewards producers for the services they offer.
Read Network Incentivisation