How the Internet works:



"The Internet is a valuable asset just like real estate property"

Just as every property comes with an address, every Internet connection comes with an IP address, that determines the user location and what he or she can or cannot access according to local regulations.



Indeed, Internet bandwidth is similar to the size of an apartment. Like square meters that determine how many people can live in the apartment, bandwidth determines how much data can pass per second through your IP address.


Internet regulations



International service providers (ISP) assign an IP address or an address space to the Internet connection of the customer. This address is typically set on the equipment that the customer gets to access the network physically (cable/DSL modem/router). All customer devices that use WiFi or a wired connection share this address or address space.

Therefore, Internet use can be identified as originating from this address. This has major implications for both, access and privacy online. ISP can block access to your IP address, certain websites, services, or download protocols. It also records Internet use and web browsing history.

Image

Access to Information



Like every property, Internet has different features that vary from one location to another. Not all IP addresses have equal access rights. Some IP addresses provide access to content that is not accessible to other IP addresses because of limitations applied to an IP address by owners or influencers of specific parts of the global network infrastructure.

Furthermore, the access to content varies from country to country in order to abide to local regulations and governments. For instance, LinkedIn is not available in Russia, Wikipedia is blocked in Turkey, Facebook cannot be accessed from China.

Thus, this rise of differences between what a person can or cannot do on a specific IP address leads to a difference in the value of IP addresses to specific people and creates a market where access to another IP address becomes something worth paying for or selling.

Today, over 77% of the global population can’t use the Internet freely. Cybercrime is on the rise. With companies digitally snooping on people, 82% of the US population worries about their online privacy. This is relevant for today’s 4.2 Billion Internet users and the next 4 Billion Minds joining the Internet in the next 5 years.

Image

"Is this the Internet we hoped for?!"

VPN services

Historically, VPN services have been introduced to the market to fight with unequal access an protect the privacy of Internet users. They provide a security layer to both private and public networks such as WiFi Hotspots and the Internet, making it possible to bypass restrictions. However, since they use a limited number of IP addresses and servers to which multiple customers connect, ISPs easily detect and block VPN users.

Image

ISPs easily detect and block VPN users that go through the same VPN server.

Decentralized Open Internet

Due to strict Internet regulations and online privacy breaches, distribution of information worldwide and even the future of democracy is under threat. The power of the Internet should not be centralized in the hands of governments and corporations. The Internet belongs to everyone and should be democratized and decentralized among its users.

Decentralization of the Internet, as well as, decentralized access to the Internet has become a real possibility thanks to the emergence of blockchain technologies that can be used for decentralized VPN solutions and peer-to-peer Internet sharing.

Why choose Zezame:

Zezame is a decentralized VPN space powered by the blockchain and cryptocurrency ecosystem where users can become VPN providers.

Unlike traditional centralized VPN providers, Zezame works with decentralized encrypted entry and exit points distributed among Guests and Hosts, and are almost impossible to detect and block by content providers (like streaming services) and restrictive, censoring governments.

Zezame’s goal is to offer additional services in the future such as peer-to-peer Internet sharing, shared Cloud service, and token payments fully regulated by its users.

Image

Zezame works with decentralized encrypted entry and exit points which make it almost impossible for ISPs to detect or block traffic.

Zezame Features:



  • Secure, Multi-layer protection of Internet connection and IP addresses.

  • Increased control of privacy for users.

    Guests have no access to the Host’s network and Hosts has no access to the Guest’s traffic.

  • Best accessibility and Internet quality.

    Decentralized entry and exit points in combination with hosted services.

  • Flexible and smart contracts.

    Blockchain smart contracts ensure that the guest will get access to the network and that the host is going to get paid. Subscribe monthly or pay as you go!

  • Latest technologies and protocols.

    Provide resilience against deep packet inspection (DPI) and blocks from the provider.

  • Community empowered.

    Anyone can become the provider and earn money.

Zezame vs. Competitors


Centralized VPNs
TOR Network
Other decentralized VPNs
Ease of Use
Speed
Continuity of service
Privacy
Community centric
Pay as you go
Not Applicable
Network participants incentived
Low detectability
Honeypot Risks