Sentinel (SENT)
Basics
- Aka Sentinel Network & Protocol
- Started in:
- Mainnet release: live on the Cosmos mainnet (27-3-2021).
- Based in:
- "a multi-protocol ecosystem focused on equal access to a marketplace of distributed services and resources."
- From this article (28-5-2020):
"The Sentinel dVPN Network started on the Ethereum Testnet but has since migrated to Tendermint and the Cosmos SDK. The Network is a network layer that enables a peer-to-peer and decentralized Applications & Resources marketplace. Within the network, the Sentinel Hub is responsible for the activity. Zones within the network run multiple decentralized or centralized apps. The validators of the Sentinel Network secure independent Zones. Multiple apps such as dVPN, dChat, and other Private Nets can run as Zones on the Sentinel Network."
"Sentinel Network allows anyone to be able to sell his or her bandwidth on its marketplace. Developers can use the Sentinel Protocol, built with Cosmos SDK, to build applications, both public and private, that use the Sentinel Network’s bandwidth marketplace for dVPN applications."
History
"As Sentinel’s testnet was originally built on Ethereum, a token swap will be launched Saturday to convert holders’ ERC-20 $SENT tokens to Sentinel’s native Cosmos-based $DVPN."
Token
Launch
Token allocation
Utility
"Users will be able to sell their bandwidth to power the Sentinel Network and be rewarded in $SENT for doing so. $DVPN will be used to secure the network, participate in on-chain governance, pay node holders and rent bandwidth."
Token Details
Stablecoin
Tech
- Whitepaper can be found [insert here].
- Code can be viewed [insert here].
- Built on: Tendermint
How it works
"Sentinel enables end-to-end encryption between users and the servers they are accessing, all with open-source transparency. The dVPN protocol has a “system of bandwidth provability,” which lets the person provide his or her bandwidth in exchange for some agreed-upon compensation from the user."
Mining
Staking
Validator Stats
Liquidity Mining
Scaling
Interoperability
Other Details
Privacy Method
"Sentinel gathers no logs pertaining to the user’s browsing or data history and uses a robust relay network with exit nodes (where the encrypted traffic hits the normal internet) whose ownership is distributed across many participating nodes, so that users cannot be identified. Traditionally, exit nodes can be monitored to observe network traffic and potentially identify users. That being said, using a dVPN doesn’t mean you will ultimately stay fully anonymous. The ever-lurking user error, downloading malware and other factors could compromise anonymity. “Importantly, ISPs could be ordered by a particular government to turn the internet off completely,” said Mancuso. “While this sounds drastic, this is certainly possible and has happened in the past."
Oracle Method
Their Other Projects
DEX
Governance
DAO
Upgrades
Roadmap
- Can be found [Insert link here].
Audits
- Bug bounty program can be found [insert here].
Bugs
Usage
Projects that use or built on it
"Sentinel has been used by Iraqi activists, for example, as an alternative to centralized VPNs, which can be hacked."
Pros and Cons
Pros
Cons
Competition
Coin Distribution
Team, Funding, Partnerships, etc.
Team
- Full team can be found [here].
- Exidio contributed to development (27-3-2021).
Funding
- In February, Sentinel completed a $3.5M fundraising round (27-3-2021).
Partners
- Part (15-2-2020) of the Blockchain Privacy, Security & Adoption Alliance (BPSAA)