Please, read carefully all the information on this page for better understanding of the technology behind Plater Network application.
The use of distributed network enables users to directly send data, files, and documents between each other. This means that information sent is not stored in any physical place but held by each network user (node). Each file has its unique cryptographic hash. When a user requests to share/receive data the network finds the nodes holding a perfect match to the unique hash or hashes and the transaction is successful.
Usage of the decentralized network across multiple users provides immutable and permanent transaction because when the transaction is approved (validated by other users of the network) the data cannot be changed.
The core objective of Plater Network is to exclude third-party services from personal transactions as it takes place now. It will help to send confidential information without any influence or interference of out-of-network entities and improve the reliability of the information.
The transactions are highly secure and time effective. Transactions are quickly verified by the other nodes. Then, additionally linked to the previous block and secured with 256-bit key encryption and tokenization, which makes it almost impossible to hack or manipulate. Because the transactions are being settled between nodes the whole process is very fast.
All the information and documentation give a clear overview on the technology and enables other people to use it without any restrictions. Plater's protocol and open-source software will be always public and accessible for everyone. It increases transparency, scalability, and expansion of the network.
The company will charge a small fee for using its software. However, Plater guarantees the best price on the market and all the charges have algorithmic nature. The token will give the access to the network. It may be acquired through the exchange or by staking (more information can be found on a Plater Token Section).
The main objective is to develop an information flow software based on blockchain technology to prevent surveillance and influence of third-party entities on vulnerable information. It will be our small contribution to shape a bright and more equal future. The concept is based on the transactions settled between particular nodes. Sender and receiver are the nodes in this case together with a validation node who confirms the transaction. The usage of Interplanetary File System was rejected to provide independent Plater Information Flow System. The sender uploads the file, document, or information. This information gets encrypted and the document hash is assigned. After verification of the transaction accordance and keys of both, sender and receiver the information can be securely transferred through the blockchain.
Plater Information Flow System (PIFS) is software being developed by Plater Network company to make secure information flow possible. Currently, most of the companies focus on messaging systems controlled by centralized authority (i.e., e-mails, social communication platforms). The Plater Network stands out and provides the solution bringing the PIFS which initiates the next-generation of information flow.
While developing the Plater Protocol the proof-of-stake consensus will be used to ensure the highest liquidity and security of the blockchain. However, for the time of raising funds, the ICO is based on a proof-of-work algorithm. The Plater Information Flow System also relies on proof-of-capacity/proof-of-storage consensus mechanism, which allows uploading files to Plater Network.
We aim to provide the best services. Therefore, in a development process, the use of new consensus mechanism cannot be excluded.
Nodes that are responsible for validating the transaction. They secure the chain by staking Plater Token ($PLATER). When the validator node approves the transaction it is settled and information can be sent between the peers.
A node that addresses the information to another user of the network. Senders can upload their files using our internal Plater Information Flow System (PIFS), which also enables data storage within the network.
A network contributor receives the information sent by addressee. Receivers get the information after transaction settlement and verification of both nodes: sender and receiver. The information will be encrypted. It ensures that the receiver node is the only peer in a network that has the access to the data sent together with the transaction.
It is a consensus mechanism algorithm used in a blockchain that allows for mining devices in the network to use their available hard drive space to decide mining rights and validate the transaction. In other, it will be used to provide the ability of uploading data to the network. PoC consensus mechanism ensures the security and liquidity of making such an action. It also ensures that each user of the network is responsible for the files uploaded to the network.
Plotting is a name for dedicating storage space on a particular hardware device to be used for calculations in the Plater Network.
PoC works by storing a list of possible solutions on the mining device’s hard drive for faster problem-solving process in the future. It helps to ensure that nodes use their hardware storage only in data transfer purposes.
Storage nodes are in this case each user of the network. It is because of the use of the PoC algorithm which makes each node capable of uploading files to the network. Therefore, each device connected to the blockchain can store its own data giving its hardware storage space in return for a reward.
A proof-of-stake consensus algorithm provides the hierarchy, in which network users who acquired more tokens have a bigger chance to become a validator. Hence, staking and acquiring the Plater Token ($PLATER) ensures the validation capability.
What is more, Plater Token can be mined by claiming and giving the storage from the device of use to make data transfers possible. Mining, in this case, means storing possible solutions for mathematical problems which give access to the network. Therefore, it ensures that the storage and file upload process will not be manipulated.
Because the application and the software are currently under development the Documentation Section is disabled. Once everything is finished you may look into all the necessary information provided. Now you are able to view more information on our Github page where the IDO docs are posted.