The content-based search engine built on the Cyber protocol is designed to operate with a new type of web interaction. The launch of the genesis ceremony of a bootloader network Bostrom is planned for November 5th at 13:00 GMT. Online translation will be available at cyb.io/genesis and held at the conference Cosmoverse in Lisbon.
In contrast with centralized search engines like Google, in the decentralized search engine Cyber, the links to the content are presented in the global knowledge graph where peers exchange information in a pure p2p fashion.
This approach deprives traditional search engines of their power over the search results: in Web3 there will be no place for opaque search index algorithms, there will be no need for web crawlers that collect information about content changes, censorship or the vulnerabilities that are connected to the potential loss of confidentiality.
“Web3 architecture assumes the links are direct to the content itself and not to the IP address or domain where the content is stored. Cyber is the response to the unfair domination of several major corporations that occupied the web searching niche. Users of the decentralized search engine will be able to search for the content by hash. After a user finds the content and it has been downloaded, the user becomes another node that distributes the content. It all resembles how Torrent networks work”, shared the team of the project Cyber.
The content becomes registered in the knowledge graph of the Cyber protocol via the transaction with the Cyberlink. Unlike hyperlinks that link servers, cyberlinks are links between data. Thereupon, the transaction is validated with the Tendermint consensus algorithm and the Cyberlink is included in the knowledge graph. Every five blocks Cyber ranks the content in the knowledge graph based on the CyberRank algorithm that successfully stands against spam and Sybil attacks.
To get V tokens (volts) that allow indexing the content and A tokens (ampers) for ranking, it is necessary to store for some time in the wallet the H tokens (hydrogen) which are the products of the liquid staking of the main token of the network (BOOT for Bostrom and CYB for Cyber). In that way, by having a network token, Cyber users will be able to access the knowledge graph resources and get staking income similar to the ones that are implemented in such networks as Polkadot, Cosmos, and Solana.
Cyber’s mission is to create the Superintelligence.
Check out the Finding Your Identity Podcast!Tags: $BTC, bitcoin, bnb, crypto currency, eth, ethereum, NewsBTC