The Supranet

The decentralized and secure network for the future.

The Supranet connects humans, institutions and apps from all over the world

Service

Introducing: The unyt Auth service

We are shipping our brand new authentication service 'unyt Auth' - a free of charge web-based authentication service that simplifies and enhances the process of endpoint authentication on the Supranet.
Read more
Code

The Backbone of the Supranet

Let us introduce the DATEX Core Library for JavaScript (legacy), fully implemented in TypeScript.
Read more
Information

Introduction to unyt.org's democratic Supranet

Our audacious plan to make today's internet a safe, democratic and fair space for everyone.
Read more
Get part of our community. Join the Supranet!

110.23M+

Messages send

1.26K+

Active endpoints

2.31K+

Total endpoints

Introduction

In the digital age, the internet is indeed the global communication medium, that's great - but something is missing here: Focus on essential design paradigms including privacy, standardization, data ownership, total equality and complete freedom.

The internet as we know it today was designed as a data exchange facility between institutions, not to become a global network that serves as the primary communication medium providing essential services for a digitalized society.

This is why we as unyt.org are working on the Supranet - an innovative decentralized peer-to-peer network that empowers individuals to engage in secure, discreet conversations and closes the gap betweem systems. With Supranet we want to allow participants total privacy and availability over their personal data and communication. We aim to eliminate the existing opaque chaos of personal data usage collected by providers on the internet. We plan to break down communication barriers between platforms and applications due to the lack of standardization. We proposes to establish a comprehensive environment for a decentralized communication network, where participants enjoys the benefits of total privacy and data ownership, sharing the same absolute rights due to fair distribution of power.

The Supranet is built with the lessons learned from the last decades. Fundamental web protocols like HTTP, TCP/IP and DNS still form the base for Supranet information exchange, but are more or less redundant due to our DATEX protocol that serves as the backbone and universal language of the whole network.

How We Shape The Democratic Web

The privacy of users is a central concern in the design of the Supranet. All communication between users (endpoints) is end-to-end encrypted per default, ensuring that only the intended recipients have access to the data. Endpoints are authenticated through the HELIX blockchain, allowing them to interact with the ecosystem in a secure and private manner. This privacy-by-design approach ensures that endpoints can interact without fear of their data being intercepted or misused by third parties.

Centralized platforms often suffer from issues of censorship and control. We recognize the importance of decentralization in fostering Supranet as truly democratic network.

For a democratic network, the following conditions must be met:

  1. Everybody can join (no fee / no exclusion)
  2. Everybody shares the same rights (fair power distribution)
  3. All communication is encrypted, secure and unlinkable (No surveillance)
  4. Censorship is impossible (Freedom of speech)
  5. Anonymous, unlinkable usage is possible

With the Supranet, all of those conditions are covered:

  1. The Supranet is open source and free to use. One of our core tenets is our commitment to open source development. By embracing the principles of transparency and collaboration, unyt.org invites developers, enthusiasts, and the wider community to contribute to the project's growth and improvement. Unlike closed-off networks that restrict entry or stifle diverse perspectives, the Supranet welcomes everybody. With open source code, we benefit from the scrutiny and contributions of a diverse community of developers. This collective effort helps to identify and address security vulnerabilities promptly, ensuring a robust and resilient platform. By harnessing the power of many, the prokect stands strong against potential threats and evolves to meet the ever-changing landscape of digital security.
  2. The Supranet is built on a decentralized infrastructure, ensuring that power is distributed among participants rather than concentrated in the hands of a select few. This approach cultivates an inclusive and diverse ecosystem where every voice has the opportunity to be heard.
  3. The Supranet uses the DATEX protocol and HELIX chain to establish connection to other endpoints. All communication is end-to-end encrypted and includes digital signatures by default between all parties. Traffic is unlinkable when using anonymous endpoints.
  4. The Supranet's decentralized network storage and the HELIX chain act as distributed unmutable ledgers. All data that was sent can be retrieved by the receiver at any time from the ledgers without giving a single authority the possibility to censor or block this distributed data.
  5. Per default, all endpoints in the Supranet are completely anonymous. The traffic and communication can not be linked to the real human entity that controls this exact same endpoint.

The backbone of the Supranet

Our native network protocol combined with a high-level language developed in-house enables communication, addressing and security in the Supranet.To DATEX
Made for the future.

Fast

DATEX allows fast multi-channel communication, for minimal latency in the Supranet.

Decentralized

The Supranet network is secured by the independent cooperation of all participating nodes, so that the network data remains secure and censorship-resistant.

Scalable

The Supranet is capable of processing and distributing thousands of hits per second thanks to our dedicated routing infrastructure.

Secure

DATEX allows encrypted peer-to-peer and one-to-many communication to ensure maximum data security.

Endpoint

Your global identifier in the Supranet: Your endpoint id

Anonymous endpoint

Per default, endpoints are anonymous and are given a random hexadecimal identifier. Anyonmous endpoints cannot be traced back to a specific person or device.

Personal endpoint

Personal endpoints are the digital link to human identities. Personal endpoints have a certificate from an official trusted authority, verifying that they belong to a real person.

Institutional endpoint

Institutional endpoints are linked to official institutions and organizations like companies or governments. Those endpoints have a certificate from an official trusted authority, verifying that the endpoint belongs to the real institution.

Thanks

Subscribe to the unyt newsletter

Get updates and opportunities from across the unyt organization and community.