Sentinel (SENT)

From CryptoWiki

Revision as of 10:22, 2 April 2021 by wiki_crypto>Zeb.dyor (→‎Basics)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Basics

  • Aka Sentinel Network & Protocol
  • Started in:
  • Mainnet release: live on the Cosmos mainnet (27-3-2021).
  • Based in:
  • "a multi-protocol ecosystem focused on equal access to a marketplace of distributed services and resources."
  • From this article (28-5-2020):

"The Sentinel dVPN Network started on the Ethereum Testnet but has since migrated to Tendermint and the Cosmos SDK. The Network is a network layer that enables a peer-to-peer and decentralized Applications & Resources marketplace. Within the network, the Sentinel Hub is responsible for the activity. Zones within the network run multiple decentralized or centralized apps. The validators of the Sentinel Network secure independent Zones. Multiple apps such as dVPN, dChat, and other Private Nets can run as Zones on the Sentinel Network."

"Sentinel Network allows anyone to be able to sell his or her bandwidth on its marketplace. Developers can use the Sentinel Protocol, built with Cosmos SDK, to build applications, both public and private, that use the Sentinel Network’s bandwidth marketplace for dVPN applications."

History

"As Sentinel’s testnet was originally built on Ethereum, a token swap will be launched Saturday to convert holders’ ERC-20 $SENT tokens to Sentinel’s native Cosmos-based $DVPN."

Token

Launch

Token allocation

Utility

"Users will be able to sell their bandwidth to power the Sentinel Network and be rewarded in $SENT for doing so. $DVPN will be used to secure the network, participate in on-chain governance, pay node holders and rent bandwidth."

Token Details

Stablecoin

Tech

How it works

"Sentinel enables end-to-end encryption between users and the servers they are accessing, all with open-source transparency. The dVPN protocol has a “system of bandwidth provability,” which lets the person provide his or her bandwidth in exchange for some agreed-upon compensation from the user."

Mining

Staking

Validator Stats

Liquidity Mining

Scaling

Interoperability

Other Details

Privacy Method

"Sentinel gathers no logs pertaining to the user’s browsing or data history and uses a robust relay network with exit nodes (where the encrypted traffic hits the normal internet) whose ownership is distributed across many participating nodes, so that users cannot be identified. Traditionally, exit nodes can be monitored to observe network traffic and potentially identify users. That being said, using a dVPN doesn’t mean you will ultimately stay fully anonymous. The ever-lurking user error, downloading malware and other factors could compromise anonymity. “Importantly, ISPs could be ordered by a particular government to turn the internet off completely,” said Mancuso. “While this sounds drastic, this is certainly possible and has happened in the past."

Oracle Method

Their Other Projects

DEX

Governance

DAO

Upgrades

Roadmap

  • Can be found [Insert link here].

Audits

Bugs

Usage

Projects that use or built on it

"Sentinel has been used by Iraqi activists, for example, as an alternative to centralized VPNs, which can be hacked."

Pros and Cons

Pros

Cons

Competition

Coin Distribution

Team, Funding, Partnerships, etc.

Team

Funding

  • In February, Sentinel completed a $3.5M fundraising round (27-3-2021).

Partners 

  • Part (15-2-2020) of the Blockchain Privacy, Security & Adoption Alliance (BPSAA)