<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[MarconiProtocol - Medium]]></title>
        <description><![CDATA[Smart Ethernet Protocol - Medium]]></description>
        <link>https://medium.com/marconiprotocol?source=rss----8f76161e4b16---4</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>MarconiProtocol - Medium</title>
            <link>https://medium.com/marconiprotocol?source=rss----8f76161e4b16---4</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sat, 23 May 2026 15:49:36 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/marconiprotocol" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Marconi Foundation Will Be Shutting Down]]></title>
            <link>https://medium.com/marconiprotocol/marconi-foundation-will-be-shutting-down-1f9de2669991?source=rss----8f76161e4b16---4</link>
            <guid isPermaLink="false">https://medium.com/p/1f9de2669991</guid>
            <dc:creator><![CDATA[Marconi Foundation]]></dc:creator>
            <pubDate>Sat, 11 Jan 2020 02:06:06 GMT</pubDate>
            <atom:updated>2020-01-11T02:05:19.357Z</atom:updated>
            <content:encoded><![CDATA[<p>Dear Marconi Community,</p><p>We regret to inform you that the Marconi Foundation will be shutting down. With the continued crypto winter and increased regulatory challenges, we felt the most prudent path is winding things down and returning the remaining proceeds to all investors.</p><p>Even though the Marconi Foundation will be shutting down, the Marconi blockchain and its source code will remain open and available, and anyone can continue to mine and use the blockchain. You can continue to keep and use your tokens, but the foundation’s core team members will be moving on from the project.</p><p>Thank you so much for your support this past 2.5 years. We hope you’ll continue to support the project into the next chapter.</p><p>Marconi Team</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=1f9de2669991" width="1" height="1" alt=""><hr><p><a href="https://medium.com/marconiprotocol/marconi-foundation-will-be-shutting-down-1f9de2669991">Marconi Foundation Will Be Shutting Down</a> was originally published in <a href="https://medium.com/marconiprotocol">MarconiProtocol</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[2019 Wrap Up]]></title>
            <link>https://medium.com/marconiprotocol/2019-wrap-up-e0c1bf445dd7?source=rss----8f76161e4b16---4</link>
            <guid isPermaLink="false">https://medium.com/p/e0c1bf445dd7</guid>
            <category><![CDATA[blockchain]]></category>
            <dc:creator><![CDATA[Marconi Foundation]]></dc:creator>
            <pubDate>Thu, 02 Jan 2020 23:19:42 GMT</pubDate>
            <atom:updated>2020-01-11T02:03:54.792Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*sy8-YpMPnEIy4_Nw8O400g.png" /></figure><p>As 2019 draws to a close we’d like to share one more update with the community. During the past few months the team has been pushing forward with several enhancements to the protocol that are now ready for release.</p><p><strong>Edge Client Support</strong></p><p>As discussed in the white paper the future vision for Marconi includes one use case where individuals can share their bandwidth with others creating decentralized internet infrastructure. Today, every node in a Marconi network is a server that shares bandwidth with connected peers, but this latest update adds support for client nodes to be able to consumer bandwidth without sharing it further.</p><p><strong>Administrative Network Traffic Optimization</strong></p><p>To optimize how individual nodes discover and connect to peers in the network the DHT discovery protocol has been updated to reduce spam and minimize the chance of hitting rate limits.</p><p><strong>POA Support</strong></p><p>Proof of Work was used in the initial Marconi implementation given that it’s a battle tested consensus algorithm used by many popular blockchains today. There are, however, challenges with this consensus and to lay the groundwork for a future transition options the team has added initial support for Proof of Authority.</p><p><strong>Performance Optimizations</strong></p><p>To better support the high bandwidth needs of datacenters and large enterprises multiple performance improvements were added for mPipe connections. To unlock further performance improvements there was additional refactoring done to support multiple mPipes in the future and multi-queue support.</p><p>This new update can be downloaded from the <a href="https://github.com/MarconiProtocol/wiki/wiki/Releases-Mainnet">releases page</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e0c1bf445dd7" width="1" height="1" alt=""><hr><p><a href="https://medium.com/marconiprotocol/2019-wrap-up-e0c1bf445dd7">2019 Wrap Up</a> was originally published in <a href="https://medium.com/marconiprotocol">MarconiProtocol</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Recent VPN Hacks Reveal Transparency Issues Within The Industry and Its Supply Chain]]></title>
            <link>https://medium.com/marconiprotocol/recent-vpn-hacks-reveal-transparency-issues-within-the-industry-and-its-supply-chain-69c27d20a433?source=rss----8f76161e4b16---4</link>
            <guid isPermaLink="false">https://medium.com/p/69c27d20a433</guid>
            <category><![CDATA[transparency]]></category>
            <category><![CDATA[vpn]]></category>
            <category><![CDATA[privacy]]></category>
            <category><![CDATA[data-breach]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[Marconi Foundation]]></dc:creator>
            <pubDate>Tue, 03 Dec 2019 21:56:06 GMT</pubDate>
            <atom:updated>2019-12-03T21:56:06.809Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*mP2Q9FmRfVYJkZqxAkvlLg.jpeg" /></figure><p>Consumers are no doubt becoming increasingly aware about the safety and security of their online activity after many highly publicized studies have shown an uptick in online data theft. According to the Federal Trade Commission, there were <a href="https://www.ftc.gov/system/files/documents/reports/consumer-sentinel-network-data-book-2018/consumer_sentinel_network_data_book_2018_0.pdf">3 million reports</a> of identity theft alone in 2018.</p><p>Even though these threats — and the <a href="https://www.businessinsider.com/data-breaches-retailers-consumer-companies-2019-1">rash of data breaches</a> — continue to grab headlines, consumers still are <a href="https://www.csoonline.com/article/3246984/why-you-should-never-ever-connect-to-public-wifi.html">connecting to public wifi</a> despite the threats and are joining other unsafe networks <a href="https://www.travelpulse.com/news/features/the-dangers-of-public-wi-fi-when-traveling.html">while traveling</a>. More cautious or tech-savvy individuals know to turn to virtual private networks (VPNs) as a way to safely connect online, and as VPNs become more mainstream, some project the <a href="https://www.statista.com/statistics/542817/worldwide-virtual-private-network-market/">VPN market</a> can grow to more than $35 billion by 2022. We’ve even seen some vendors to capitalize by creating flashy <a href="https://www.ispot.tv/brands/nH8/nordvpn">TV commercials</a> that insinuate that they are consumers’ digital doorman.</p><p>However, as these companies look to pull back the curtain on the nefarious digital underworld, I can’t help but wonder if the curtain has been sufficiently pulled back on their own operation? I don’t mean this as if they, too, are digital thieves taking oblivious consumers’ data (though some very well do <a href="https://thenextweb.com/contributors/2018/05/28/be-cautious-free-vpns-are-selling-your-data-to-3rd-parties/">sell your data</a> to third parties), but instead question whether the VPN industry has been transparent about its own security protocols.</p><p>It wasn’t that long ago that NordVPN, probably the most well-known vendor, was <a href="https://techcrunch.com/2019/10/21/nordvpn-confirms-it-was-hacked/">hacked</a>. An attacker broke into one of its servers in an overseas data center by penetrating a surprisingly insecure remote management system left by the “unnamed” data center provider.</p><p>While NordVPN became the latest high-tech hack and even though there’s great irony of being an insecure security system, that’s not the egregious issue here. It’s also not the fact that the breach went unnoticed for a month, though that one does sting a little extra. The real warning here is that NordVPN not only didn’t know the system was being used to support its operation, but it also had no idea the thing even existed. Think about that for a minute; a data-security vendor engaged with a core partner and didn’t audit all of the potential vulnerabilities within their partners.</p><p>Was NordVPN just an industry anomaly that had a single lapse in judgement? Nope, we came to find out that this vulnerability not only compromised NordVPN, it also <a href="https://twitter.com/hexdefined/status/1186106695073726466?s=21">exposed others</a> like TorGuard. Now we have a scary trend. There are already a lot of <a href="https://slate.com/technology/2019/02/best-vpn-companies-trust-privacy.html">sketchy VPN providers</a> marketing to a consumer base that is still largely unfamiliar with the technology — including <a href="https://www.theregister.co.uk/2018/11/19/vpn_app_investigation/">those</a> that may be willing to share your data with authoritarian governments. But now even the most “trusted” have proven that they, too, have either lax or downright sloppy protocols in place to mitigate all points of potential attacks.</p><p>Why is this such an issue? The whole situation exposes a huge question mark around whom is auditing these VPN players’ infrastructure. It also completely exposes the lack of transparency that the VPN industry has around its supply chain. Even in the wake of the NordVPN hack, the guilty data center provider was left unnamed.</p><p>When I was managing infrastructure at Google to make sure it all ran securely and efficiently, which included dealing with thousands of devices and partners, I experienced firsthand how difficult it was to have perfect visibility into the infrastructure supply chain. We went to great lengths — and had to invest a lot of resources — to map out every single integration, app and extension that our employees and partners used to do their jobs.</p><p>While not every organization has access to the same level of resources that I did at Google, many VPN providers claim to have all the best features to keep consumers safe (military-grade encryption, no logging, automatic kill switches, etc.). However, it’s all moot if they fail at keeping their servers secure. What the VPN industry seemingly lacks is a real desire to create backend infrastructure that can automatically see every single vendor supporting their operations — including their partners’ partners — and instantaneously and automatically identify threats.</p><p>There’s no doubt that it’s a hard networking challenge to solve, but it’s not without options in the age of blockchain. The supply chain and partner auditing issues are two of the reasons why I was attracted to blockchain-backed networking after leaving Google, because it can offer a more straightforward answer to the problem. Both the infrastructure-auditing and lack-of-transparency issues are key challenges where the principles of blockchain hold promise.</p><p>Blockchain can make the entire supply chain and infrastructure more easily audited. Each supplier can record what they did and didn’t do on the blockchain and sign in using their private key. In the NordVPN case, there would’ve been a log of the administration tool left on the server, which would’ve been easily flagged during a review of the supply-chain history.</p><p>While blockchain is one possible approach, the bottom line is that it’s time these VPN vendors start minding their own kitchen before they burn the whole house down. It’s no longer enough to simply trust the VPN industry to disclose its supply chains and then assume it’ll self-police. If vendors want to truly provide the utmost transparency and lock down their infrastructure, then a good place to start is either making a tremendous investment in independent auditing or looking to the vigilant blockchain community.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=69c27d20a433" width="1" height="1" alt=""><hr><p><a href="https://medium.com/marconiprotocol/recent-vpn-hacks-reveal-transparency-issues-within-the-industry-and-its-supply-chain-69c27d20a433">Recent VPN Hacks Reveal Transparency Issues Within The Industry and Its Supply Chain</a> was originally published in <a href="https://medium.com/marconiprotocol">MarconiProtocol</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Welcome, Yimin]]></title>
            <link>https://medium.com/marconiprotocol/welcome-yimin-bc325f55060a?source=rss----8f76161e4b16---4</link>
            <guid isPermaLink="false">https://medium.com/p/bc325f55060a</guid>
            <category><![CDATA[infrastructure]]></category>
            <category><![CDATA[software-engineering]]></category>
            <category><![CDATA[cryptocurrency]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[team]]></category>
            <dc:creator><![CDATA[Marconi Foundation]]></dc:creator>
            <pubDate>Wed, 18 Sep 2019 23:05:55 GMT</pubDate>
            <atom:updated>2019-09-18T23:05:54.864Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/400/1*ERpjrcfYIP6JEGpqpFN7iQ.jpeg" /></figure><p>We are pleased to announce that Yimin Yang has joined the team as a Software Engineer. Yimin will be working on tooling &amp; infrastructure for the Marconi Protocol. As a passionate crypto fan, he is really excited to learn and develop with the rest of Marconi team.</p><p>Yimin received his master’s degree in Electrical &amp; Computer Engineering from Carnegie Mellon University. He got his first taste of blockchain a few years ago as a member of CMU’s blockchain group. Prior to Marconi, Yimin was working at Sogou and Fujitsu Research &amp; Development Center. In his spare time, he enjoys crypto trading and movies.</p><p>Great to have you here, Yimin!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=bc325f55060a" width="1" height="1" alt=""><hr><p><a href="https://medium.com/marconiprotocol/welcome-yimin-bc325f55060a">Welcome, Yimin</a> was originally published in <a href="https://medium.com/marconiprotocol">MarconiProtocol</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Mining Pool Upgrade & Migration]]></title>
            <link>https://medium.com/marconiprotocol/mining-pool-upgrade-migration-e54c4ffa32fd?source=rss----8f76161e4b16---4</link>
            <guid isPermaLink="false">https://medium.com/p/e54c4ffa32fd</guid>
            <category><![CDATA[networking]]></category>
            <category><![CDATA[mining]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[migration]]></category>
            <category><![CDATA[bitcoin]]></category>
            <dc:creator><![CDATA[Marconi Foundation]]></dc:creator>
            <pubDate>Wed, 28 Aug 2019 21:00:59 GMT</pubDate>
            <atom:updated>2019-08-28T21:00:59.070Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*wHXltPoLMxts2sLIz5W8uQ.jpeg" /></figure><p>To provide a better experience for our mining community we are adding two new regional mining pools with improved infrastructure for better scalability and lower latency. The current mining pool (mine1.marconi.org) will be decommissioned as part of this process so it’s important that miners update to the two new pools. There are two ways to update to the new pools:</p><p><strong>1) Self-Migration</strong></p><p>Today, miners can start using the new pools to immediately benefit from the improved performance and scalability. It just takes a simple config change.</p><pre><em>1) Go to the directory where marconi-stak is installed.</em></pre><pre><em>2) Edit pools.txt with your favorite editor</em></pre><pre><em>3) In the “pool_list” section of the file</em></pre><pre><em>4) Update “mine1.marconi.org” to “mine2.marconi.org” for the US West or “mine3.marconi.org” for Asia region</em></pre><pre><em>5) Save the changes</em></pre><pre><em>6) Stop the marconi-stak process</em></pre><pre><em>7) Start the marconi-stak process</em></pre><p><strong>2) Automatic Migration</strong></p><p>Anyone still mining via the current mining pool (mine1.marconi.org) will be automatically migrated to one of the new pools on <strong>Tuesday, September 3 at 2pm PST</strong>. At that time the DNS settings for mine1.marconi.org will be updated to point to mine2.marconi.org (US West). It can take up to 24 hours or more for the DNS update to propagate to a miner and when that happens they may notice a temporary disconnect in their logs. Note that if there are many miners attempting to reconnect at the same time it may take several attempts before a connection is successfully established.</p><p>Rest assured that all pool payouts will be completed before the current mining pools is fully decommissioned.</p><p>If you have any questions or comments please find us on <a href="http://t.me/marconiprotocol">Telegram</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e54c4ffa32fd" width="1" height="1" alt=""><hr><p><a href="https://medium.com/marconiprotocol/mining-pool-upgrade-migration-e54c4ffa32fd">Mining Pool Upgrade &amp; Migration</a> was originally published in <a href="https://medium.com/marconiprotocol">MarconiProtocol</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Connectivity Fault Tolerance for Mission Critical Systems]]></title>
            <link>https://medium.com/marconiprotocol/connectivity-fault-tolerance-for-mission-critical-systems-41dab1f071c7?source=rss----8f76161e4b16---4</link>
            <guid isPermaLink="false">https://medium.com/p/41dab1f071c7</guid>
            <category><![CDATA[mining]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[bitcoin]]></category>
            <category><![CDATA[networking]]></category>
            <category><![CDATA[vpn]]></category>
            <dc:creator><![CDATA[Marconi Foundation]]></dc:creator>
            <pubDate>Tue, 27 Aug 2019 23:41:49 GMT</pubDate>
            <atom:updated>2019-08-27T23:41:49.548Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Owmd8asIXiAxStSegFZxPA.jpeg" /></figure><p>Many businesses today operate out of multiple locations that need to communicate with each other and one of the most common ways of connecting them is via site-to-site VPNs. Site-to-site VPNs create secure connections between locations over the public internet and make computing resources in one location available in another location. Connecting over the public internet provides a lot of flexibility, but it also puts these businesses as the mercy of <a href="https://www.theverge.com/2018/12/28/18159110/centurylink-internet-911-outage-fcc-investigating">ISP outages</a> which, unfortunately, are fairly common. Outages can be caused by human error, physical cable disconnects/damage, technology failures in the ISP’s network stack or a host of other issues. No matter the cause, site-to-site VPNs can’t operate during an outage which means that the business loses critical access to resources. For many businesses this can mean lost revenue, reputational damage or worse.</p><p><strong>How is this solved today?</strong></p><p>The only way to reliably achieve fault tolerance when an ISP suffers from an outage is to leverage multiple ISPs. While that sounds simple in concept, it’s not easy to implement with site-to-site VPNs. The VPN software must be configured to detect a failover and then subsequently route traffic from the primary connection to the backup. There is <a href="https://en.wikipedia.org/wiki/Hot_Standby_Router_Protocol">a long established protocol</a> for handling this, but it’s <a href="https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/17826-ipsec-feat.html">not easy to configure</a> and it’s a proprietary protocol which means you’re locked into using specific hardware which typically comes at a steep cost. <a href="https://documentation.meraki.com/MX/Site-to-site_VPN/Site-to-Site_VPN_Failover_Behavior">Newer solutions</a> exist which are far easier to setup, but those still require proprietary hardware and licenses. Alternatively, businesses with very savvy network engineers can manually configure automatic failover, but that type of expertise is hardly common anymore and it’s likely not easy to maintain anyway.</p><p><strong>High Availability Site-to-Site VPN with Marconi</strong></p><p>Marconi can be an <a href="https://github.com/MarconiProtocol/wiki/wiki/Sample-Use-Cases#connecting-branch-offices">easy to manage, cost effective solution</a> for businesses needing site-to-site VPNs. However, with just a few additional commands it’s possible to use Marconi to create a fault tolerant network with automatic failover to redundant ISP connections. The Marconi Protocol can create multiple mPipes across different physical connections backed by different ISPs and then, using Marconi’s unique L2 bridging functionality, merge those connections to back a single virtual IP. Each site now has a Marconi virtual IP that apps &amp; services in each site can be configured to use with confidence. Even if primary ISP goes down, that IP will still be operational since Marconi will seamlessly failover to the redundant mPipe connection. This can all be achieved on commodity hardware with Marconi’s open source software. Configuration is also minimal since much of the traditional configuration &amp; information exchange needed for VPN setup is handled automatically through the blockchain.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*-f4Cy3V93i2pT60X" /></figure><p>If you’re interested in learning more about how to set this up in your own corporate network or datacenter today contact hello@marconi.org.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=41dab1f071c7" width="1" height="1" alt=""><hr><p><a href="https://medium.com/marconiprotocol/connectivity-fault-tolerance-for-mission-critical-systems-41dab1f071c7">Connectivity Fault Tolerance for Mission Critical Systems</a> was originally published in <a href="https://medium.com/marconiprotocol">MarconiProtocol</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Software-Based Load Balancing]]></title>
            <link>https://medium.com/marconiprotocol/software-based-load-balancing-dea0b86f5b6b?source=rss----8f76161e4b16---4</link>
            <guid isPermaLink="false">https://medium.com/p/dea0b86f5b6b</guid>
            <category><![CDATA[networking]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[load-balancing]]></category>
            <category><![CDATA[open-source]]></category>
            <dc:creator><![CDATA[Marconi Foundation]]></dc:creator>
            <pubDate>Wed, 17 Jul 2019 23:34:27 GMT</pubDate>
            <atom:updated>2019-07-17T23:34:27.429Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*PRBzNCSqndB7PkqazBZfOQ.png" /></figure><h3>The Problem</h3><p>As businesses scale today it’s not uncommon for high traffic websites to serve hundreds of thousands, or sometimes millions, of simultaneous requests. To meet this demand organizations spin up new servers to provide bandwidth, redundancy and fault tolerance, but which server should respond when a client makes a request?</p><p>The industry standard solution to this challenge is to use load balancers that can listen for client requests and then route them to a pool of servers where the request can be served quickly and reliably. Unfortunately, the industry standard solution has also been to use hardware load balancers which are expensive and inflexible. If more servers are needed or if an environment changes (a common scenario in today’s fast paced environments) then new hardware usually needs to be purchased.</p><h3>How is this solved today?</h3><p>Savvy companies today have started shifting to software based load balancers which can address the challenges of elasticity, automation and cost. These new load balancers can be deployed on commodity hardware to reduce costs and built in automation can scale up the number of load balancers as needed. Unfortunately, many of these load balancers still require expensive annual licenses in order to unlock the futures enterprises truly need. Some software based load balancers offered by cloud providers do have lower license / usage fees, but that typically comes at the cost of vendor lock in where you’re required to use their instances for your servers. Many of today’s applications that have high demands (e.g. voice &amp; video chat, real time game streaming) also utilize UDP as the communication protocol.</p><h3>Load Balancing with Marconi</h3><p>With the Marconi Protocol organizations can gain many of the benefits of software based load balancers without the expensive per instance licenses or vendor lockin. Marconi’s open source platform can be deployed on any number of systems as needed without any additional costs and the robust development platform means these load balancers can be easily updated with new configuration or functionality as needed. More importantly, a Marconi based load balancer, leverages the built in connectivity &amp; security features so that the upstream servers for the load balancer can live in a multiple data centers or cloud providers without any additional connectivity headaches. Due to the low level at which Marconi is implemented, almost any protocol (including UDP) is supported.</p><p>Get started today with a Marconi based UDP load balancer by following the <a href="https://github.com/MarconiProtocol/wiki/wiki/Sample-Use-Cases#how-to-setup-a-load-balancer">setup guide</a> on the <a href="https://github.com/MarconiProtocol/wiki/wiki">Marconi Wiki</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=dea0b86f5b6b" width="1" height="1" alt=""><hr><p><a href="https://medium.com/marconiprotocol/software-based-load-balancing-dea0b86f5b6b">Software-Based Load Balancing</a> was originally published in <a href="https://medium.com/marconiprotocol">MarconiProtocol</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[With net neutrality repealed, how blockchain-based networking can protect online privacy]]></title>
            <link>https://medium.com/marconiprotocol/with-net-neutrality-repealed-how-blockchain-based-networking-can-protect-online-privacy-f082aa89f65b?source=rss----8f76161e4b16---4</link>
            <guid isPermaLink="false">https://medium.com/p/f082aa89f65b</guid>
            <category><![CDATA[network-security]]></category>
            <category><![CDATA[net-neutrality]]></category>
            <category><![CDATA[vpn]]></category>
            <category><![CDATA[privacy]]></category>
            <category><![CDATA[blockchain]]></category>
            <dc:creator><![CDATA[Marconi Foundation]]></dc:creator>
            <pubDate>Thu, 27 Jun 2019 23:34:30 GMT</pubDate>
            <atom:updated>2019-06-27T23:34:30.667Z</atom:updated>
            <content:encoded><![CDATA[<h4>VPNs may not offer enough protection.</h4><p><em>(The following article from our Chief Architect, Jong Kim, was featured on </em><a href="https://www.networkworld.com/article/3405520/with-net-neutrality-repealed-how-blockchain-based-networking-can-protect-online-privacy.html"><em>Network World</em></a><em>.)</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*_ZCYNiMlSBrkiCq4.jpg" /></figure><p>In today’s digital-everything world where so much of our personal and professional lives are online, most people seem to have less of an expectation of data privacy than ever before. They know that companies (and governments) are mining their data, but after all of serious breaches of trust, it’s no wonder that a majority are now becoming wary of both their data’s security and how it is used.</p><p>In fact, a <a href="https://www.usatoday.com/story/money/2018/11/09/americans-more-concerned-data-privacy-than-healthcare-study-says/1904796002/">study</a> by Harris and Finn Partners found that Americans are more concerned with data privacy than they are with job creation. That’s a shocking finding, but maybe it shouldn’t come as that big of a surprise. From the Facebook data scandal, to the horrendous number of retail data breaches to the serious <a href="https://www.csoonline.com/article/3246984/why-you-should-never-ever-connect-to-public-wifi.html">security threats that even come with using public WiFi,</a> nothing seems safe. And now with the repeal of net neutrality, even our internet service providers <a href="https://www.usatoday.com/story/tech/news/2017/04/04/isps-can-now-collect-and-sell-your-data-what-know-internet-privacy/100015356/">are free</a> to collect and sell our browsing data.</p><h3>The heightened threat for some groups</h3><p>Even though <a href="http://fortune.com/2019/02/25/consumers-data-privacy/">few people</a> take measures to secure themselves, so many have really good reasons to consider protection, which means securing online activity is becoming more essential every day. Imagine for journalists wanting to report news in totalitarian states known to monitor online behavior, the threat couldn’t be more pronounced. Even in the U.S. — with reports about the Homeland Security Department’s plan to <a href="https://www.forbes.com/sites/michellefabio/2018/04/06/department-of-homeland-security-compiling-database-of-journalists-and-media-influencers/#5aac59036121">keep a database</a> of journalists and media influencers — is it that far-fetched to think a pressured ISP who now has the right to collect traffic data wouldn’t turn something over?</p><p>This fact is none truer than for those operating blockchain nodes, a group notoriously vigilant about security and anonymity. Even in the networks underlying blockchain, there is so much information up for grabs, that many blockchain thought-leaders have <a href="http://s.bl-1.com/h/c77sWyBd?url=https://www.bitcoininsider.org/article/46616/ethereum-core-developer-reveals-weird-trackers-exposing-user-location-information">expressed</a> concerns. The security threats are everywhere. Even crypto’s hottest trend, staking, has <a href="https://www.ccn.com/dubbed-cryptos-hot-new-trend-staking-raises-major-security-risks">plenty of security risks</a>, especially related to the <a href="https://www.businessinsider.com/secure-cryptocurrency-blockchain-technology-2017-10">exposure of metadata</a>.</p><p>These early realizations have started to take hold in the blockchain community, sparking a <a href="https://www.coindesk.com/four-projects-seek-solve-ethereums-privacy-paradox">hastened pace for research</a> about obscuring data down to the application level, a transparent system that publishes smart contract and transaction data. But, regardless if you’re a blockchain developer or just a concerned consumer who wants to stay anonymous, what can you do?</p><h3>VPNs aren’t always secure</h3><p>Today, many people know VPNs as a way to protect anonymity online. These services, whether paid or free, route user traffic through an encrypted connection to the VPN provider’s servers to supposedly never reveal a user’s IP address. But, while they’re a well-known privacy solution, they aren’t without their own issues.</p><p>A <a href="https://thenextweb.com/security/2018/03/27/26-popular-115-vpns-keeping-tabs-saying-theyre-not/">study</a> by TheBestVPN demonstrated that among the top 115 VPNs, 26 collect personally identifiable information including IP addresses, locations, bandwidth data and connection timestamps. In some cases, VPNs, like many of the free options, <a href="https://thenextweb.com/contributors/2018/05/28/be-cautious-free-vpns-are-selling-your-data-to-3rd-parties/">sell user data</a>. Then there are absolutely ludicrous instances where VPNs have sold customer bandwidth to third parties, like hacking groups, which will turn <a href="https://www.csoonline.com/article/2928346/users-of-free-vpn-hola-vulnerable-to-hacking-researchers-warn.html">unsuspecting users into botnets</a>.</p><h3>Blockchain as a networking alternative</h3><p>It’s time to start looking to blockchain to create gateways as an alternative to VPNs. Advances in blockchain applications have made it possible to not only protect against cyber threats, but also obfuscate where a connection originates, ultimately keeping user data encrypted.</p><p>Setting up your own mini-relay network that can proxy traffic on and off multiple servers globally is an option, and open-source and peer-to-peer networking implementations are ongoing. This would not only allow people to manage everything themselves, but also allow for traffic to be routed through an encrypted connection and exited through a different node. For instance, say you have ten nodes, with one behind a firewall (not publicly facing), and the other nine are acting as relay nodes, bouncing traffic from server to server. If your primary server is in Bulgaria, that configuration will come across as if it were broadcasting from that location.</p><p>If you require even more protection, you can obfuscate even further by using multiple servers and having traffic exiting off of multiple nodes, leaving hardly any ability to trace the server location.</p><p>It’s similar to using a personal TOR network, but an important distinction is that you control your own nodes. Not to mention, it’ll probably be faster, as TOR networks can be painstakingly slow. Even creating the most complicated obfuscation topologies is a real possibility because of blockchain’s rapidly advancing development, so if leaving zero digital breadcrumbs is essential to your operation, you’re not without hope.</p><p>The bottom line is that we don’t have to accept privacy in the digital age as a thing of the past, even if data exposure exists in the smallest window of opportunity. There seems to be this assumption that if you want to be part of the connected world, the consequence is that you must leave a piece of you behind. But as we’ve seen time and time again within the blockchain community, we aren’t about “accepting” or “assuming” anything to be a foregone conclusion or impossibility.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=f082aa89f65b" width="1" height="1" alt=""><hr><p><a href="https://medium.com/marconiprotocol/with-net-neutrality-repealed-how-blockchain-based-networking-can-protect-online-privacy-f082aa89f65b">With net neutrality repealed, how blockchain-based networking can protect online privacy</a> was originally published in <a href="https://medium.com/marconiprotocol">MarconiProtocol</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Mining Software Now Available for Windows]]></title>
            <link>https://medium.com/marconiprotocol/mining-software-now-available-for-windows-131929dc740e?source=rss----8f76161e4b16---4</link>
            <guid isPermaLink="false">https://medium.com/p/131929dc740e</guid>
            <category><![CDATA[mining]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[bitcoin]]></category>
            <dc:creator><![CDATA[Marconi Foundation]]></dc:creator>
            <pubDate>Fri, 14 Jun 2019 20:07:17 GMT</pubDate>
            <atom:updated>2019-06-14T20:08:05.400Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/600/1*Yo2t3v3lCGHylJuMymb_Uw.png" /></figure><p>We’re excited to announce that the Marconi mining software is now available on Microsoft Windows. Mining on Marconi offers a platform for the community to support and secure the Marconi blockchain through PoW mining. With this release, a new set of miners will be able to join our growing mining community.</p><p>Get started today by visiting our <a href="https://github.com/MarconiProtocol/wiki/wiki/Mining-Overview"><strong>GitHub Mining Page</strong></a></p><p>Also, here is a quick start info for those looking to mine on Windows:</p><p>Recommended Equipment Specs:</p><ul><li>Windows 7 or 10</li><li>1GB Memory</li><li>CPU Mining — Dual Xeons or higher recommended</li><li>GPU Mining — NVIDIA GTX 1060 or higher OR AMD RX 480/580 or higher</li></ul><p>General Mining Details:</p><ul><li>Support for CPU and GPU miners at multiple performance level</li><li>Dashboards for tracking miners, block rewards and payouts</li><li>Proportional payouts multiple times a day</li><li>0% Pool Fees</li><li>Algorithm: CryptoNight v8</li><li>Block Time: 30s</li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=131929dc740e" width="1" height="1" alt=""><hr><p><a href="https://medium.com/marconiprotocol/mining-software-now-available-for-windows-131929dc740e">Mining Software Now Available for Windows</a> was originally published in <a href="https://medium.com/marconiprotocol">MarconiProtocol</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Our Mainnet is Live!]]></title>
            <link>https://medium.com/marconiprotocol/our-mainnet-is-live-522f85dd53f5?source=rss----8f76161e4b16---4</link>
            <guid isPermaLink="false">https://medium.com/p/522f85dd53f5</guid>
            <category><![CDATA[mainnet]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[privacy]]></category>
            <category><![CDATA[blockchain]]></category>
            <dc:creator><![CDATA[Marconi Foundation]]></dc:creator>
            <pubDate>Thu, 16 May 2019 22:16:08 GMT</pubDate>
            <atom:updated>2019-05-17T18:27:11.225Z</atom:updated>
            <content:encoded><![CDATA[<p>We’re excited to announce that the <a href="https://www.marconi.org/?utm_source=prnewswire&amp;utm_campaign=MainnetBlog">Marconi</a> <a href="https://github.com/MarconiProtocol/wiki/wiki/Releases-Mainnet">Mainnet</a> is live. This marks the culmination of two years of development. Here’s a quick overview of the Mainnet along with a few other updates.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/800/1*5G2TWMHKqxEYTlNxd6SC7w.png" /></figure><p>With the Marconi Mainnet, network administrators can easily deploy and secure their networks, and developers can build their own compelling networking solutions and security applications. Marconi’s Mainnet comes with many documented applications that work out of the box, including:</p><ul><li>multi-cloud deployments that enable network administrators to leverage unique features, regions and pricing of different cloud providers</li><li>firewalls for securing traffic on a blockchain network from suspicious activity</li><li>secure gateways to preserve the anonymity of online activity whether that’s crypto transactions and staking or even just basic internet browsing</li></ul><h3>Get Started With Mainnet</h3><p>We’ve compiled a few helpful guides for getting started with Marconi:</p><ul><li><a href="https://github.com/MarconiProtocol/wiki/wiki/Setup-Instructions-Mainnet">Setup Instructions</a></li><li><a href="https://github.com/MarconiProtocol/wiki/wiki/Architecture-Overview">Architecture Overview</a></li><li><a href="https://github.com/MarconiProtocol/wiki/wiki/Network-Admin-Overview">Quick Start Guide for Network Admins</a></li><li><a href="https://github.com/MarconiProtocol/wiki/wiki/Developer-Overview">Quick Start Guide for Developers</a></li><li><a href="https://github.com/MarconiProtocol/wiki/wiki/Sample-Use-Cases">Sample Use Cases</a></li><li><a href="https://explorer.marconi.org/home">Block Explorer</a></li></ul><p>If you’d like to help operate and secure the network check out the <a href="https://github.com/MarconiProtocol/wiki/wiki/Mining-Overview">Mining Setup Guide</a> to start mining and earning Marcos.</p><h3>Roadmap</h3><p>We recently published the <a href="https://medium.com/marconiprotocol/our-roadmap-whats-ahead-e2e0d957248f">high level roadmap</a> for the Marconi Protocol. Here’s a quick recap of what’s complete and what’s still ahead:</p><ul><li><strong>2018 December</strong> — Testnet launch — <em>Completed</em></li><li><strong>2019 January</strong> — Blockchain Network Security &amp; Multi-Cloud Support support — <em>Completed</em></li><li><strong>2019 March</strong> — Mining support — <em>Completed</em></li><li><strong>2019 May</strong> — Mainnet launch — <em>Completed</em></li><li><strong>2019 October</strong> — Staking on Marconi subnetworks — In Development &amp; On Schedule</li><li><strong>2020</strong> — Marconi link an extension to Marconi Pipe designed to work with wireless</li><li><strong>2021</strong> — Networking metering to capture server availability and bandwidth contributions</li></ul><p>Check out the <a href="https://docsend.com/view/5zragmb">White Paper</a> for more details on each milestone.</p><h3><strong>Technical Advisory Board</strong></h3><p>To help further the vision of the Marconi Protocol, we recently announced that preeminent cryptographer and co-inventor of public key encryption, Dr. Whitfield Diffie, has joined our technical advisory board. Diffie is a 2015 Turing Award Winner and previously served as Chief Security Officer at Sun Microsystems. “It is encouraging that Marconi is working to add a new layer of security and privacy to the blockchain and Internet ecosystem in their mission,” said Diffie.</p><h3>Community</h3><p>For the latest updates on the project you can always follow us on the following channels:</p><ul><li><a href="https://t.me/marconiprotocol">Telegram</a></li><li><a href="https://twitter.com/marconiprotocol">Twitter</a></li><li><a href="https://medium.com/marconiprotocol">Medium</a></li></ul><p>A lot of effort went into the development of this smart ethernet protocol and we couldn’t have done it without the amazing support of our community and investors. While this is a thrilling milestone for everyone, we believe that what’s ahead is even more exciting. Please stay tuned over the next few months for more news.</p><p>Thanks,<br>Marconi Team</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*MATpvhg6CXE57EwC0CL3Cg.jpeg" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=522f85dd53f5" width="1" height="1" alt=""><hr><p><a href="https://medium.com/marconiprotocol/our-mainnet-is-live-522f85dd53f5">Our Mainnet is Live!</a> was originally published in <a href="https://medium.com/marconiprotocol">MarconiProtocol</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>