Skip to content
Branch: master
Find file Copy path
Find file Copy path
1 contributor

Users who have contributed to this file

537 lines (363 sloc) 49.9 KB

The ELI-5 FAQ for Cyber

This is an attempt at creating an "Explain it like I'm 5" FAQ for Cyber. This is a work in progress, any help will be appreciated.

The biggest help will by submitting more questions that you think were unanswered. To submit questions to this FAQ use GitHub issues. If you don't have a GitHub account or you are not sure how to open an issue, simply tag serejandmyself in our TG channel, and leave your question there!

You may skim through questions, of course, but I recommend you to buckle up your seat belt and read it all.

But, first:

What is a FAQ?

A FAQ is a list of frequently asked question that tries to gather as much as possible information about the project in one place. The purpose of this is to answer questions, as simple as possible, to give the reader a basic overview of a specific subject, and if necessary, refer the reader to more detailed information.

Table of content

Like google, but cyber:

What is cyber?

Simple answer:
Cyber is a decentralized google, for provable and relevant answers.

Detailed answer:
The explanation below is NOT going to be simple, so please do not be put off by it. All the terminology used in the first explanation WILL be explained in detail later in this document. Let me assure you, that if you keep on reading, you will be able to understand Cyber with almost zero previous knowledge.

Cyber is essentially creating a brand new protocol (a procedure that helps computers to do things in a certain way) for adding and searching information onto a knowledge graph (a compilation of facts about something that provides meaning to the user). And rank this information. In other words, it's a decentralized google.

Users create links between 2 IPFS hashes (keep on reading to see what this is) and place them on a knowledge graph by spending bandwidth (amount of data that can be transmitted over a fixed period of time). Users also link IPFS hashes linked to keywords, which helps to enrich the knowledge graph with... knowledge.

That content is then dynamically ranked with the help of digital tokens and the current parameters of the networks load. This makes the rank dynamic (characterized by continuous change, activity, or progress).

All this is computed (determined with the help of a computer) by validators (a program or a computer that are responsible for checking the validity of something). The validators do so, by using their GPU's (literally - graphics cards).

This allows to search data on the web, rank it, query it (look it up) and create knowledge databases without blackbox intermediaries (third parties that try to censor data, hide or push specific results to obtain money, track your data, etc).

The interesting thing is that such a simple mechanism allows creating a lot of powerful tools as a result. We will go in-detail further down the document into those. For example: unified semantics, SEO instruments, autonomous robots, and a lot more.

What cyber is NOT?

Cyber is not a commercial product. In fact, it is not a product as such. It is an instrument if you wish, or a tool, that anyone can use. That said, cyber allows for several ways for its participants to earn rewards.

Cyber is not THE new internet. It is a tool that can help to shape and to decentralize (distribute the power of authority) the new Great Web.

The philosophy behind Cyber:

What problem are you trying to solve?

We are trying to solve the problem of data centralization and data censorship. Which in other words, is decentralization of common knowledge (assuming that data is the new knowledge, and that we are moving into the digital age).

Why are you doing this?

Each person should be able to control their own data, their identity, their knowledge. The universe can become a better place if our children live in a digital environment where they are in charge of their actions.

What's wrong with google?

google is a brilliant idea. We do not deny this. But google is the rebel that has overthrown the dictator and became the dictator itself. google uses you to shape the essence and the fundamentals of communications between everyone and everything. Whilst at it, google doesn't care for anyone and will make money on your action and your behalf.

It should be noted, that by this question I am attempting not just at google, but at all the mega-digital corporations. Feel free to check out what this can lead to in the shape of Cambridge Analityca. If this case is too much to take in or too "loud" for you, feel free to watch some episodes of Black Mirror to see how digital control can "break" society.

Why now?

Because we are almost done with post-industrialism. We are slowly and surely moving into the digital realm. One can deny or accept this. Now is the time to either have the tools that will help us to shape the matrix the way we want to shape it or give those powers away to someone to control all aspects of our lives.

Why search?

Search is a global mechanism that is globally understood by everyone, regardless of language, race, age, etc. It is somewhat a basic instinct (searching for food to survive, etc). In the digital realm with the help of search, we gain answers to our questions, which we always ask. Search helps us to build a model around any subject that is of interest to us. With the use of search, we can build databases, which can lead to a great number of useful instruments (on these later).

Aren't there other, more important problems to solve?

There probably are. But we decided to focus on this because we understand how to achieve the required result. There are probably more problems and questions to be solved (like hunger, wars, ecology, etc). Our tool can help to play a role in solving if not all, but some of these.

Aren't there other things out there that solve this?

There is a lot of awesome, open-source technology on the market that can commit to making a change in the world. Most of the technology we use is not something we invented (although the code itself is written from scratch!). They are technologies that have existed previously and are awesome at doing what they do. Our software is a combination of existing technologies, protocols and our own work that has arisen from this. It is specifically targeted at fixing what is broken.

How are users/developers/others benefit from using such a system in comparison to google, etc?

Why do you need consensus within Cyber?

A consensus is required for nodes to agree on the current state of the ledger at any given point of time. This is needed to achieve security, transparency, immutability and decentralization.

What is your take on: privacy/censorship/routing?

We believe that privacy should be a fundamental right. As of now, the protocol is pseudo-private (just like Bitcoin is). I.E. you know which hash linked something and with what weight, but you don't know the real name of the user. With that, we are planning to implement full privacy into the protocol.

We are strongly discouraged by any censorship and view it as a sin against any living and/or thinking organism.

Routing should be always permitted. Transactions should always be permitted to pass. Otherwise, this is censorship.

Do you not think that the motto #fuckgoogle is offensive?

No, because fucking is not for pain, it is for pleasure!

High-level, IT, blockchain and some explanations:


Why Cyber?

We like that name. That's one reason. We have been using this name throughout our projects for the past 6 - 7 years.

Cyber refers to anything that is very smart. The meaning is rooted from the word cybernetics (check out this article on Wikipedia) - a science which describes the behaviour of dynamic systems with feedback loops.

In popular culture, it has become a partial synonym to all the crazy sci-fi things out there. Like the cyber-track by Elon Musk and co. Cyber refers to cyberspace. Space free from centralized, human influence and bureaucracy. It is the Andromeda of freedom. The last frontier...

What exactly are CIDs?

A CID is a content identificator or an IPFS hash. That means its a something that represents (or rather - points to) a specific file/piece of data within the IPFS protocol.

What are cyberlinks?

Cyberlink is a link between two CIDs or between 2 IPFS hashes.

What's DURA?

DURA (distributed unified resource address) is our equivalent of an URL (an abbreviation for uniform resource locator), which is what you see in your browser when you visit a web2 website. The whole idea behind DURA is very simple. Browse content without relying on any registry service (ICANN). This means no relying on third parties for packet routing. No censorship, etc. Apart from the philosophical stand, DURA's can deliver security, globality and permanent linking.

How is cyberlink different to a hyperlink?

A hyperlink is dependent on central data servers and packet routing. But, IPFS hashes are immutable (cannot be tampered with after they were created, or - permanent). Meaning that no one can tamper with it, as opposed to hyperlinks (this does not mean that you cannot change a file or modify it, but if you do - the fact that you have done a change, will be known to others).

This allows us to make sure that the information in a cyberlink is true. Cyberlinks can also form linkchains of information if they were created by the same user.

Is linking that important?

Yes! Hyperlinks shape the internet. They have built it. We base our knowledge, our political, economic and educational decisions on the internet. We learn from google. google is our father, teacher, source of knowledge, social life, etc. But, how can we trust the internet if it was shaped by something that itself is untrusted? Well, we can't. Cyberlinks, on the other hand, are trusted and backed by a provable and an auditable mechanism that anyone can check. This means that with the aid of cyberlinks we can, no less, but create a trusted model of all the information in the universe!

How is content ranked in cyber?

You might be surprised to learn that our ranking mechanism is based on no other, but the original idea of PageRank! The differences are that our mechanism mixes into the pot economical incentives in the form of digital tokens and bandwidth. This makes it "Sybil-resistant".

How are pages included or excluded from the index?

Pages are added to the index (the word index is about all the information stored on the knowledge graph in the blockchain) when someone submits a CID or creates a cyberlink. This is a transaction. Transactions are checked by validators (the computers that make sure you have the balance to submit a transaction) and added to the knowledge graph, which is then accessed by someone who queries the database.

Pages are not excluded from the index in any way.

So is there any censorship?

Nope... Not on the protocol level. Not on the database level. Not on the consensus level. Every transaction should and must be routed (passed to its destination whatever it may be).

So what do you do with those who break the law?

If we obscure from the question of what is the law and by whom it is determined, then:

There are no bad intentions in wanting to find the answer to something. You might not know something is "bad" until you know what it is. We are born Tabula Rasa - a clean sheet. The answer itself might indeed contain information that someone might see as "bad" or "inappropriate". This is not something we can control. We do not produce the information, we provide the tool to search through it and obtain it.

It can be assumed that in the future, someone will build applications on top of cyber and might want to filter out information on the application level (the results that the end-users sees and interacts with). This is not encouraged, but indeed, is up to the developer. We will never do something like this. Regardless if this happens or not, the protocol will NOT be censored and that information will be accessible.

This will create a competition between developers to pass the truth to the users.

So who has the power?

No one or rather everyone. Our idea is to design a tool where everyone feels equal. With that said, this can defiantly act like a competitive instrument. Someone who posses more tokens can link content (and hence rank it) with more weight. However, we would like to discourage the thinking that someone has more power than others (continue reading) as the purpose of the tool is to share and access information freely. The amount of tokens in possession does not influence this virtue.

So whoever is richer will always stay on top, right?

Someone who ranks content with a higher value will see his content ranked higher. That is obvious. With that, he does not have an indexation preference. Here, the principle: first come - first served, will always function. If you were first to index something, then you indexed it before someone else did. I mean if I ate the last ice cream in the fridge, then I ate the last ice cream in the fridge.

With that, the search is dynamic. If I rank a content then it is relevant to me here and now. If I am not interested in it, then I have stopped ranking it. Older ranks will dilute with time. But, apart from my weight, the rank depends on the weight of incoming and outgoing ranks. And those ranks depend on their incoming and outgoing ranks... This makes it a never endless game, where simply because I have more tokens, might not be enough for me to always end up on top.

A comparison to wisdom of the crowd can be made, where the collective opinion has a larger weight than that of a single entity.

What are some basic use-cases?

Of course, the most basic use case is a search mechanism (described above). Other, described in this file, may include:

  • Personal and autonomous robots and assistants that can study the information you feed them.
  • Cyber gives you the ability to access your database of knowledge. Theoretically, create a personal knowledge graph and query it. This means no more losing information.
  • Offline search. IPFS makes it possible to easily retrieve a document from an environment without a global internet connection. cyber itself can be distributed by using IPFS. This creates the possibility for off-line search!
  • Universal language and semantics. A dream of a truly global language is hard to deploy because it is hard to agree on what means what. However, we have the tools to make this dream come true. The semantic core is open, so competition for answering queries can become distributed across different domain-specific areas, including the semantic cores for various languages.
  • Basic income: Such a robot can help to solve 2 problems (a) personal data reselling - if you want to sell it, you decide to do so. (b) the above is just one example of how to produce basic income. In theory personal data, trading robots, content robots, oracle mechanism - they all can provide a human with a basic passive income. This solves a world-renowned issue!

How do you use IPFS?

cyber uses IPFS as the current backbone on which users perform the search. Think about IPFS for cyber, as of the fridge for the lightbulb inside of it. Users use IPFS to store and publish content and files. cyber lets users rank, index and find it.

How do you use Cosmos?

Cosmos provides the consensus mechanism for cyber. We use Tendermint as an engine that helps the network to reach agreement on its current state, perform transactions on the blockchain, validate search results, etc

Why did you choose Cosmos \ Tendermint?

It was the most efficient, suitable for our needs and ready to use the network when we started to build. We share the philosophy that Cosmos propagates when it comes to decentralization and openness of information + we believe that the security of the protocol is at a level that suits our requirements.


What is cyber~Page?

cyber~Page is the face of the protocol. It allows you to search for things. Obtain results. View statistics. Use governance procedures.

What is Cyb?

Cyb is your friendly robot / personal browser application. One one hand it is a mere browser. But it isn't. The problem is that there is no such word as of now that describes what cyb is exactly. It is a browser in the sense that it lets you search for things. But it is your personal applications, that can understand many other things. It can act as a wallet. It can act as a database. It contains your cyber-space robots. For now, we call this a browser. But I would imagine that something along - personal customizable web application, provides a better description.

What is cyb~Virus?

The virus is a chrome extension (in the future this may apply to other web2 browsers). Its idea is to demonstrate the ability of cyber to download, save and rank any content from web2 to web3. We use chrome because we like irony. The idea to fuck google right in google's playground fascinates us.


What is governance in cyber?

the cyber protocol is governed by its users. We will talk about specifics further. But, the idea is that it is the users that should decide (by coming to a majority agreement) on what is and should be happening in terms of development, what rewards they should receive, how should a certain something work and so on.

What is cyber~Foundation?

The role of cyber ~Foundation is to help the community govern the protocol via an Aragon DAO. It is a fund managed via a decentralized engine, charged with the donated ETH and managed by the community (agents of the protocol).

What is cyber~Congress?

The initial intentions of cyber ~Congress can be found in this document. It helps to launch the protocol, commits to the code base, helps to gather the initial community, write the initial documentation, organise the distribution and deploy the Genesis. The Congress lives in Ethereum, as an Aragon DAO. It is responsible for organising the Game of links and the minting of THC tokens.

What is cyber~Ecosystem?

It is the entity that is responsible for helping to grow the ecosystem. Its common goal: to build a better and a unique new web - the Great Web. To achieve this it will help to form partnerships, onboard communities, help research, connect people, do VC work when necessary, create and review documentation, participate in the governance, help to validate and build the chain and its applications

Who are cyber~FundClassic?

It is the future fund to be created and to help applications grow within the cyber ecosystem.

Why so many cyb~Entities?

Why not, is the simple answer. The other answer is to divide the work evenly and equally amongst several entities that are each responsible for their field of work. A browser is an application, while the protocol is the protocol. They are not one entity. Same goes for the governing process. Different entities are responsible for different questions.

Validating cyber:

How do I become a validator in Cyber?

Make sure you have the requirements described above and follow this guide.

What do I need to become a validator in Cyber?

Anyone can become a validator if he has the right hardware to run it. Right now, the requirements are as following:

  • CPU: 4 cores (6 is better)
  • RAM: 16 GB (64 would be better)
  • SSD: 256 GB (512 is preferred)
  • Connection: 100 Mbit fiber
  • GPU: CUDA / GeForce 1070/80
  • Software: Linux, Docker

Do I need to become a validator?

It is only up for you to decide if you do. As a validator, you will be entitled to receive rewards out of the inflation for committing your hardware.

What are the incentives for becoming a validator?

You can earn rewards and help to bootstrap the network by running a validator node. Apart from that:

  • You can use your cards to take part in computing the knowledge graph and be a part of an interesting project
  • You will be receiving rewards for running a validator, just like in Cosmos (ATOM)
  • You will be eligible to build your reputation in the system and can participate in governance during the mainnet
  • You can receive a commission from delegators on the mainnet
  • You can take part in forming the knowledge graph of the new Great Web
  • Become a web3 provider


Are there rewards involved for users?

Yes. Users can delegate their stake to validators and also receive rewards (although a validator might charge a commission for this). Users are rewarded in terms of their content becoming non-censored and reachable by anyone, anywhere.

To understand the true values of CYB tokens to users, one must understand that the users are the consumers and the service providers. Developers, entrepreneurs, SEO, buyers, and searchers simultaneously! Essentially, this means that users can build their own knowledge graphs, influence search results, build applications and monetize them.

Cyber provides an opportunity for content and browsing without censorship, advertisement, data re-selling. Completely customizable and personified browsing experience, solely to you.

Can this even be monetized?

It can be. Yes (to be completed).

How many tokens do you have?

There are currently 2 tokens.

Why do you have 2 tokens?

Due to technical limitations, there is no way to have all of the described below characteristics in one token. We do not think that having several tokens is a bad thing. In the future, there might be other tokens on top of the DAO or/and the protocol. Of course, if they are proven to help the economics and the agents of that economics.

What are the names of your tokens and what does each one do?

We have 2 tokens. CYB and THC (pronounced as TECH). CYB is the native token of the system and is used for security and bandwidth. THC is used as a governance token in our Ethereum DAO.

How many tokens are there?

1 PCYB of tokens (and growing). And 700 TTHC. That's a lot, we know.

What are MCYB / GCYB / TCYB / PCYB?

Those are representations of the amounts of CYB tokens in mega, giga, tera, peta, etc. I.E. 1GCYB of tokens is 1 Giga CYB of tokens or 1 with 9 zeros, which equals to 1 billion. 1 GCYB = 1000000000 CYB

Why do you need so many CYB tokens?

We want to show the world that the digital age contains a lot of numbers. Much more than we can think of. Nature strives towards huge numbers. Grains of sand, neurons, stars in the sky, etc.

On a lower-level, search queries go well beyond billions. This means that we need a lot of tokens to search for a lot of things.

What is the CYB token?

CYB is a native token of cyber powered by the Tendermint consensus algorithm. It has 3 primary uses: (1) staking for consensus, (2) bandwidth limiting for submitting cyberlinks, and (3) expression of will for the computing of cyber~Rank by the agents.

What is THC?

THC is an Ethereum based ERC-20 token that has utility value in the form of control over cyber~ Foundation and the ETH from the distribution games. It is a governance token. The creative powers of THC come from the ability to receive 1 CYB token per each (one) THC token when locking it before the end of cyber~Auction.

Is there anything else I can do with the tokens?

The usability of both tokens is straightforward. One is the core protocol token, used primarily for bandwidth, protection, security, transacting, etc. The other for governance.

Of course, other implementations can be applied. For example, both tokens can be used within the realm of prediction markets. Another example is using the protocol token as a means to an end. I.E. paying for a service.

Do you have transactional costs?

Not in Cyber. I.E. CYB tokens do not have transactional costs. We use bandwidth instead. This means that transactions are free on one hand, but on the other hand, they require you to own at least something to make a transaction and hence, are protected from spam. On the other hand, THC tokens are Ethereum based, so - yes, they have transactional costs withing the Ethereum ecosystem (transactions cost gas).

What are Resource Credits (RC)?

Resource credits are our name for bandwidth amount of an account in the protocol. They are calculated from the liquid stake of an account and allow users to transact. Transactions in the protocol are everything that is done on-chain (on the blockchain). This can be linking, sending tokens, ranking, etc.

What are the distribution games?

The distribution games are a way of improving the distribution of tokens to a higher number of participants in a fairer way through a gamified process.

What do you need them for?

There are 3 distribution games proposed in total. Their goal is to help increase the initial efficiency of the distribution.

What is Game of Links (GOL)?

The name is partially self-explanatory here. The idea is to distribute tokens based on several parameters (disciplines within the game). Those include not just linking but some other technical things. The simple idea behind this is to make the protocol better at the start and to make sure tokens are distributed to those who are interested most in the success of the idea (initial believers). Check out more details here.

What is Game of Thrones (GoT)?

It's a game where one community of hodlers tries to outbid the other in return for receiving a larger discount. 10% of CYB supply is allocated per each competing community. 100 TCYB to the ATOM community for donating ATOM. And an equivalent amount to the ETH community, which will initially receive THC tokens that they can lock during the auction in exchange for CYB tokens (in other words the ETH donators can potentially receive both THC and CYB tokens). The game will last for 21 days.

What is cyber~Auction?

cyber ~Auction is part of the initial distribution games. If the first two focus on specific target groups (although anyone is free to participate). The goal of cyber ~Auction is to focus on all types of users. It will take place after the end of the previous games.

The auction will last for 500 rounds that last for 23 hours each (a little over 479 days). Every round has 1 billion THC is at skate. The more you donate and the less has been donated by others on that same day the more you can gain. After the end of the distribution, participants will be able to unlock their THC tokens and use them as they wish, e.i. transfer, trade, etc. As a result of the auction, the community will have access to all the donated ETH within the Aragon organization.

One more mega important part of the auction to remember, are the creative powers of THC. If you vest your THC tokens for the period of the auction - you receive 1 CYB token for each locked THC token for the duration of the auction!

Can you explain what are EUL / GOL tokens?

They are both experimental tokens needed to launch the productive equivalent. EUL is the testing equivalent of CYB and GOL of THC.

Tell me about your distribution

The distribution looks like this: There are 700 TTHC tokens (Tera are 12 zeros). They are broken down as per follows: (numbers are rounded)

  • 71.4% are for cyber~Auction
  • 14.3% are for GoT
  • 14.3% is allocated to cyber~Congress

There are 1 PTCYB (a peta is 15 zeros). They are broken down per following:

  • 90% for the distribution games (in other words open-sale) and for those who stake THC tokens (including cyber~ Congress)
  • 10% is a gift to Urbit, Cosmos and ETH communities

A complete breakdown of THC and CYB by category can be viewed in the launch-kit readme file and our whitepaper.

So is the inflation endless?

The inflation in cyberd is defined by validators.


I've read you have gifted other blockchain communities, why?

The purpose of this is to help the network gain traction at the beginning. And to increase the initial network participation. This will help to increase participation and give more participants the ability to engage in the protocol. We chose these specific communities because they are the best communities, in our opinion, to help to form the knowledge graph and to reach the masses.

What's Urbit?

Urbit is your personal server, identity, IP address, VM (virtual machine) and an operational system. It is the new computer science. Improved and more efficient. At the same time, Urbit can help us to envision the initial vision of peer to peer internet.

What's Ethereum?

Ethereum is the largest distributed computer in the world today. It is the Lego bricks of blockchain technology, that allows developers to create applications on top of the Ethereum blockchain with the use of smart contracts.

What's Cosmos?

Cosmos is the next evolutionary step in blockchain technology. Just like Ethereum, it allows developers to create individual things. Rather than focusing on applications. It allows developers to create independent blockchains (with the help of modules - prebuild kits that contain what you need and the ability to modify them as you wish), with their own applications, behaviour rules, etc. What's more important, is the ability of these blockchains to communicate one with another via exchanging value (data).

Why do you gift these particular communities?

Those gifts can help grow the protocol. As a result, it will gain a massive benefit via the economic integration of the largest developers, the most innovative and of the most promising communities withing the open-source space.

Are there any airdrops?

Yes. The gifts are that exactly.

How to check if I received any of the gifts?

The best way to do so this is to use, simply enter your ETH / ATOM / URBIT address and see the result instantly!


Ok, I get it - so how exactly do you calculate the rank?

The idea of the ranking mechanism is based on the original PageRank, but with the implementation of a token-backed bandwidth. Or in other words a similar model, but with economic incentives and protections. The rank is dependent on the difference between the weight of the incoming ranks and the weight of the outgoing ranks. The network load is also a property that is calculated to obtain the rank.

As of now, the rank accounts for the current intention of the agents, and it encourages rank inflation. This makes sure it cannot be tampered with and that we do not get stuck in the past with content ranking.

This mechanism is fully described in our white paper. On-chain governance may change this mechanism in the future (and do so more than once), based on simple A/B testing of different network characteristics important at the time to the network.

How is the search algorithm safe from abuse?

This is one of the easiest and the most complicated questions we get asked. Several things prevent abuse. (1) The consensus mechanism (the more nodes, the better), (2) the resource credit model (an economic spam protection mechanism), (3) the thing is, is that the network belongs to the users, governed by the users and is utilized by the users. They are the sole beneficiaries of the network. If you attempt to abuse the search mechanism, the only thing you can abuse is yourself. The network will stay where it stands. This is a difficult concept to grasp, but this is the reality of things for web3.

What's CUDA?

It is an interface communication model created by NVIDIA, that allows many processes to be executed at the same time. It allows developers to use their graphics cards for computing general-purpose computations (usually handled by the processor).

Why do you use GPU?

Because we need to process a big amount of computations very quickly. CUDA allows us to do this. More so, this allows using your computer for creating semantics, this is something needed (the use of anyone computational resources) if we want to achieve a more complex matrix with relation to our knowledge and our fundamental needs to search for answers.

What about ASICs?

Right now there is no question about them. As of now, it is irrelevant in our protocol. If such a need will arise, we believe that the governing mechanisms implemented in the protocol will be able to handle this.

We already have more plans on how to introduce other computational resources into the picture. For example, this can be a PoW mechanism based on RandomX algorithm. But, once again, as of now ASIC's are out of scope for our current work.

It should be noted that in our case ASIC's are not a bad thing if they do arise on the horizon. In the case of Cyber ASIC's will help the validators to compute more knowledge onto the knowledge graph, hence making it better!

Once the content is in the index, how does it get "tagged" / returned in response to a specific query?

When a user queries the knowledge graph (searches for an answer/searches for a result), he is returned a bunch of IPFS hashes that have been semantically tied with the specified words that the user searched for. Those IPFS hashes contain the desired content that the user asked for. As he clicks it, he will obtain this content locally on his machine (computer).

White Paper, launch and contacts:

Do you have a White Paper?

Yes, we do. It can be found and manually compiled, with the help of Xelatex, from this repository. You can view a PDF version via this IPFS hash.

When are launching a stable mainnet?

The network will launch when Game of Links is done (the other 2 games are held after the launch). There are 146 active validators and all the tokens are distributed. As of the end of 2019, the ETA is summer 2020. We strongly encourage participation when GoL kicks-off!

Who are the people behind the project?

We are a team of geeks, enthusiasts, thinkers, hackers and people who firmly believe in what they want to achieve.

If you wish to, you can skim through our GitHub and easily find links to some of our public profiles (like keybase) and much more information about each one of us. All of us can be reached here or on our forums.

Are you Satoshi?

We wish... And we don't. We wish we were so smart and to have the knowledge of whomever Satoshi was/were/ is/are... We do not wish because knowing who Satoshi is, would destroy the whole idea of Satoshi.

Why are you so geeky?

Why not? Geeky is the new cool. Geeks are awesome. If you didn't notice the world has been ruled by Geeks since the Microsoft made it to the top. In the last century, geeks have been all around us. From Facebook to google.

How do I contact you?

Via our GitHub, via our forum or via our TG chat.

Do you have any normal chats/ a forum maybe?

We have a forum. You can join if you have a GitHub account. And we have a TG chat.

More questions:

Why open-source?

Because open-source technology is the future way of communication between projects, users and developers. Open-source doesn't stop at referencing to technological progress. Open-source is a new way to collaborate. It allows people to freely change, commit to and modify ideas. And as a result, help progress and innovation at a higher temp and in a more secure manner.

Have you even tested this?

Yes, we have. There have been numerous private and public testnets. In fact, as of now, we are still testing and improving the protocol.

Does it work?

Yes. It works exactly as described in our documentation.

Is this P2P?

Not exactly. It is in the sense that users are interacting peer to peer with their computers, without a company in the middle. However, technically a blockchain is also an intermediary. What's good, is that you don't need to trust a blockchain thanks to how it functions.

What is the difference with such P2P search engines as YACY?

YACY (and other P2P similar mechanisms) have plenty of years of work behind their backs, which cyber (still) hasn't. YACY is pure P2P, cyber isn't. It has a blockchain between the users. Also those years of work which YACY and the others have, kind of proven that they don't work. Otherwise, we would not be making cyber.

What's chaingear?

Chaingear is one of our secret weapons. It is not yet fully described by us. But in its essence, it is an ETH based ability for anyone to create a personal or a public database with the help of NFT tokens. For example, one may create the database .porn and then create records in that database. I.E., and yes, it works just like a domain-based structure. But it's not a domain-based structure, as it allows you to create other types of databases too.

What about crawlers and indexing?

We understand that for the internet to change it means that every single piece of content needs to migrate to the new version of the web. This is an ambitious task. But it can defiantly be accomplished. Once upon a time, people believed that putting telephone lines all around the world was impossible, but it happened.

To do this we need crawlers. A lot of crawlers that can transfer content. We have created a basic crawler that you are welcome to use(you may need some technical skills to install it).

So, how do I join this?

You should join to play the Game of Links (described above), check out the launch-kit for more information!

You can run a validator node to help test, improve and launch the network. This will be the biggest (and probably the most beneficial to all sides) commitment as of now. The launch guide requires some technical skills and experience and can be found here.

But, you don't have to become a validator. You can use the virus extension to create cyberlinks. You can join our forum to discuss any ideas. You can participate in the distribution games and so on.

How do I use it?

You can use the cyb~Virus extension if you are a non-technical user. It is HIGHLY unsafe software as of now, so you should only use it at your own risk.

What is the fastest way to get tokens?

Play the Game of course! Another quick way, is to use future faucets or Kira's TG bot.

How many tokens do I need to start using cyber?

There isn't a specific amount of tokens you need to use the network. This is a very dynamic property. The current statistics can be viewed on It should be noted that all transactions require bandwidth (resources). However, transactions don't spend your tokens. The tokens "freeze" for some time, after which, they are released back to the user. This is a spam protection mechanism.

Can I use it on web2 (normal browsers / phone, etc)?

Depends. You can certainly view and download IPFS hashes via gateways to your phone/web2, etc. We presume that in the future people will be building some kind of bridge between what we do and web2. But we do not see this is a task and shall not work on it. People should move to web3.

Can I contribute?

Depending on what you do, there are several ways to contribute:

  • You can help by solving issues / submitting PR (booth technical and non-technical)
  • You can help our research
  • You can spread the word about Cyber on social networks, to your friends, on the internet or in any other possible way

Will I be rewarded for my contributions?

There are several ways someone can get rewarded:

  • We actively use GitCoin. This means that we fund some of our tasks and issues. If you are an open-source developer, you can solve issues and get rewarded
  • We constantly announce grants for open-source development and research. For example our Urbit open-source proposal
  • You can gain social weight and social reputation by becoming an early adopter (please make conclusions for yourself, as to what this might gain)
  • If you run a validator node, you are entitled to receive rewards that are described above

Whats GitCoin?

Gitcoin is a crowdfunding and freelance developers platform that lets you fund different issues from your GitHub, using smart contracts and ETH.

Is this an ICO?

The projects receive donations from users who wish to donate them and participate in the distribution games. The process can be referred to as an initial community offering. Which is the process where the community understands the value of the proposed idea and decides to donate towards its development for its own benefit.

Why do you need donations?

Thanks to ATOM donations we want to secure a commitment for cyber~Congress in the development of both: Cosmos and Cyber ecosystems. ATOM donations will allow for cyber ~Congress to use staking rewards for continuous funding of the protocol without the necessity to dump tokens.

THC donations will be managed by an Aragon DAO (the community) to help develop the protocol in the longterm.

Why don't you have KYC/AML?

Because we do not understand the purpose of this mechanism concerning privacy and decentralization. Anyone is free to do what they want to do. If someone wants to donate and thereafter decided that it's his free will to KYC this donation in some way. It's his free will. It is our free will and our belief that decentralization is not about KYC and/or AML. If you don't agree with this, then you probably aren't ready for decentralization. Simply walk away.

Is this religious?

Yes. By all means, it is. It is the most anti-religious techno-religion in the wild.

What is your main target audience?

Our main TA are internet users. We plan to concentrate on developers, IPFS users, crypto maniacs and like-minded people at the beginning. We then, want to concentrate on younger generations. We firmly believe that they can grasp what we do (including our values) better than anyone else.

How do you plan to take over the world/internet?

By showcasing and awesome product and with the help of the community behind it. Of course, those are loud words. But our product is working. The idea has proved to be functioning and has a proved and a cemented market demand. We are experimenting, but we are an experienced team. We have the knowledge, the understanding and the passion to drive this product forward. In combination with the product itself, the code, the community, the donations, the DAO, and everything else - it will either happen (the taking over)... or it won't. Either way, we will do everything to make this happen!

I read one of your manifests, are you crazy?

I would lie if I said we weren't. But doesn't it take a bit of craziness, abstract geniuses and adventurism to change the world? Knowledge is a vital virtue that we possess. But if we were normal, we wouldn't be any different from the rest.

Why do you talk so much about values?

Because values are what spins the world around. Our values lay at the core of the technology that we have created. Those values are the driver of that innovation. They are the goal. The technology is the instrument to get there.

Why all species?

Because all species should (and will) have an equal opportunity for secure and transparent communication.

How can all species be intelligent?

Intelligence can be simplified to communication. All species can communicate via electromagnetic impulses (including robots). If they can communicate (which they can), they can prove their existence and pass on a signal and receive an answer. This is intelligence at its most pure form.

Why do you need all those manifests/researches? How does it help the project?

We think that it is stupid to achieve any goals without understanding the problem you are trying to solve. Daily, all around the world, people do something... But why do just something, when you can do THE something that needs to be done and that solves the problem you or someone else were trying to solve? We believe that all of this can, and will, help the project as it evolves trust in what we do. Shows that we have an understanding of what and why we do it. And that we are ready to prove the world that it will help to fix broken protocols for the better.

How is this AI related?

First, what is AI? AI is the intelligence demonstrated by a machine. This doesn't necessarily mean that the machine must be from the year 12255 (by then, it will probably be a world of machines as it is).

In its essence cyber is a huge distributed consensus computer, it is a dynamic protocol that is influenced by different machines and users simultaneously. It learns from actions. It can prune things that are irrelevant to it. It can prove the relevance of any two existing objects that are known to it.

I heard I can use my Ledger device, really?

Yes! You should. A ledger is a hardware wallet and its possible to sign transactions in Cyber straight out of your Ledger device! Awesome, right?

Follow our set-up guide (requires some technical skills). By the way! it is also possible to set up a validator node with a Ledger device.

Can I copy what you do?

Go ahead. Seriously. We are open-source for a reason. YOu may copy, modify, do as you please. Our license agreement is this: Don’t believe, don’t fear, don’t ask.

Eventually, we will meet each other with the help of IBC or other instruments of the free market.

Can I build something on top of cyber?

You defiantly should! The idea of forking cyber is not just a call to action. It is a call for development. You may build your specialised search (knowledge graphs) that reference to our general-purpose knowledge graph. You may provide services on top of your own, or our knowledge graph and IPFS (services such as e-commerce, SEO, hosting, identity, etc).

You can also build personal knowledge graphs that can help you to learn or to build relevant and provable databases for any purposes.

I don't get it. I'm still confused

I would advise you to read some of the provided links below. Use issues to ask questions that you think were left unanswered.

In general, think of cyber as of a completely, brand-new mechanism for obtaining answers. Of a soft capable of building universal knowledge and communicating.

Links to various relevant resources:

(in no particular order)

You can’t perform that action at this time.