The Promether Platform is a new type of network called an Adaptive Symbiotic Network (ASN). Based on the principles of Artificial Intelligence (AI) and Ubiquitous Computing, it allows you to create any type of network to meet your specific needs simply by deploying and configuring a series of reusable software components. Powered by a flexible and adaptive architecture centralized, decentralized, distributed, mesh-based, and hybrid network topologies are all supported.
The Promether Platform fully implements end-to-end encryption to secure any application. This allows developers to focus on implementing application features instead of worrying about the potential security vulnerabilities of the network and communication protocol. All applications, old and new, are supported.
The Promether Platform is completely open-source and open-infrastructure. You control the code and how the network is configured and deployed. The platform is designed to abstract away the underlying details of end-to-end network security from the applications that use it. Promether is operating system, protocol, and chipset agnostic.
The Promether Platform is written in 100% POSIX compliant and modern C/C++. It's operating system, protocol, and chipset agnostic. Multiple application programming interfaces (API) are available to connect apps to the network. The network nodes are also fully programmable and support a variety of low-level, reusable services such as discovery, caching, proxying, persistence, data analysis, and packet broadcasting.
The Promether Platform puts privacy first. Besides supporting a majority of modern cryptographic routines, the platform can subvert and evade corporate and government firewalls, proxies, Deep Packet Inspection (DPI), network black boxes, and other anti-privacy techniques. With advanced options such as federation, packet chunking, protocol inversion, multicast obfuscation, and mimicking standard network protocols; the Promether Platform can meet your network needs.
The Promether Platform makes it easy to secure all your applications. Whether you choose to integrate at an operating system, network proxy, or even at a raw C/C++ or Python API level; your applications will be secured. The endless options available via a modern configuration format gives you full control of your data and network. All this is possible without sacrificing any performance due to the platform's focus on speed.
Unlike decentralized and persistent networks, the Promether Platform is free to use. However, token owners and those who contribute back to the overall capacity of the network are given prioritization. This ensures that anybody can use the network while minimizing leaching. To further incentivize the growth of the network, those who choose to donate capacity back to the Promether Platform will receive payment in token. It's a win-win for everybody.
Companies are re-inventing the wheel with respect to secure data transmission. Application teams spend unnecessary time implementing and testing security code when they should be concentrating on building great applications. Security is very difficult to get right, and many of these companies make mistakes that create vulnerabilities that can be exploited by hackers.
We've moved to a social networking model for most of our online interaction with a focus on ease-of-use and convenience. The security requirements of social networks is completely different than those of past application paradigms. Do you really trust Facebook with your deepest secrets or access to your financial information?
The biggest security flaw of all is always us. No amount of due diligence, secure development practices, or adherence to compliance and regulatory mandates will be able to stop a hacker who is motivated to find and exploit vulnerabilities in a system. Anybody who says otherwise is either lying or trying to sell us a security product.
Companies claim that handing over our personal data is the only way to benefit from the convenience offered by the modern Internet. So, we trust them with our personal data and in exchange they make billions hosting our data in the Cloud. When our data is hacked due to corporate negligence and incompetence, companies are not held accountable. Only we can save ourselves.
Governments now collect more bulk data about their citizens than ever before. In addition, governments have manipulated companies into configuring backdoors into their systems to collect customer data. All of this is done in violation of End User License Agreements (EULA) and Terms of Service (TOS) agreements, and we, the customer, are never notified.
Decentralized and persistent networks attempt to solve a huge, monolithic problem and force the end-users to buy into the whole system in order to access the underlying functionality. What we need is choice and flexibility, not limitations.