No longer will apps reveal your sensitive information to hosts.
With the Force network, connections utilize trustless end-to-end encryption, routing, and substitution protocols that restricts access to your information.
No longer give your internet service provider access to your network traffic and website metadata.
Force enables net neutrality by providing a customizable, encrypted, and multi-layered network path that keeps your information private.
No longer do you need to trust intermediaries to route data without spying on, blocking, modifying or selling it along the way.
With Force, no one can tell who the sender or the receiver is and no one can read the data while it is in transit.
Hop node routing chains can be custom-built to create fast, low-latency network paths using approximate node location data. For ultimate anonymity, location-aware routing is optional.
With Force, the user’s and host’s IP/metadata are completely hidden from each other. This keeps the hosts safe from discovery, the data safe from censorship, and the users anonymous.
The Force network supports community-developed routing protocols that enable payload data to be wrapped in an infinite number of ways. These protocols build on top of the flexible routing architecture to provide additional network capabilities and keep traffic indistinguishable from other types of internet usage.
Utilizing Blockchain technology the Network incentivizes those with network resources to share them with others in exchange for FOR tokens. Service packages are built by “payment nodes” that can be managed from the in-wallet browser to make using the Network simple for end-users. Services can also be contracted directly for advanced users.
Nodes can provide any number of network services based on which protocols they want to support and their resources available. We anticipate the network could grow to support all modern communication protocols such as E-mail, streaming, torrents, gaming, messaging, etc
Network prices are automatically adjusted in order to incentivize node operators to provide the most in-demand services while keeping prices comparable across different node providers. Automated pricing also keeps malicious nodes from underpricing others in order to damage the network.