TON Sites, TON WWW, TON Proxy
The TON project is more than just a blockchain — it also has a unique network technology.
First of all, network protocols were created specifically for the TON blockchain so that nodes could communicate with one another and exchange data. Currently, the network houses solutions that are so powerful and universal that, together, they equate to the internet of a new generation.
The TON network is interesting itself, even apart from the TON blockchain, it’s fully decentralized, secure, and private computer network akin to TOR or the I2P (Invisible Internet Project).
TON network is deeply integrated with TON blockchain, the project’s native Toncoin cryptocurrency and TON services — it creates a synergy, elevating the network’s technology to a whole new level.
The TON network
- Decentralized: A peer-to-peer network that has no centralized servers.
- Stable: Nodes that go offline have no effect on the network’s functionality.
- Anonymous: It’s impossible or difficult to identify a node's IP address.
- Encrypted: Data is encrypted when sent to nodes.
- The network uses the UDP/IP and TCP/IP internet protocols.
You can find a more technical explanation of the protocols on the TON network in The Open Network’s white paper, in Chapter 3.
The TON blockchain uses the TON network.
For the last three years since the project’s inception, the TON blockchain’s nodes (validators, server, etc.) have been communicating with one another with the help of the TON network, the combination of which has proved to be stable and effective in practice.
As operations on the blockchain become more complex, more powerful network solutions will eventually be required. The TON network fully satisfies the needs of latest generation blockchain; for example, when the TON blockchain divides into sub-blockchains due to high throughput, each sub-blockchain use its own individual sub-network.
TON Sites
The TON blockchain is not the only thing that uses the TON network.
Starting today, you can launch a web server with your website and make it available on the TON network — i.e., to make a TON Site.
Read the guide here.
Mandatory encryption and verifying the authenticity of data
In the early days of the current version of the internet, all data between users and websites — e.g., conversations on chats — was always exposed where it could be read by someone else on the internet. There was also no way to confirm whether data was altered in transit.
In time, HTTPS appeared, which encrypted and authenticated data.
For over 15 years, HTTPS has been proliferating across the internet; however, around 20% of websites don’t use this protocol by default.
Nevertheless, there is always the possibility of users’ data being sent through unencrypted channels.
In light of this, the TON network has its own mandatory encryption and automatically verifies the authenticity of all data traffic.
No more need for certification authorities
To receive encryption and verify the authenticity of data, regular websites need to have a special certificate. Technically, you can create this certificate yourself, but in the internet it will have a lower level of trust. Usually, certificates can be obtained at certification authorities — some cost money, and others are free.
It’s assumed that these authorities check the site’s owner; however, in reality, even expensive extended-certificates don’t receive their due diligence.
In short, these certification authorities don’t do anything.
TON Sites provides encryption and authenticity verification of data via built-in cryptography. Your site will be immediately secure without having to go to a certification authorities.
No more need domain names registries
For regular websites, you rent the domain name from a commercial entity — i.e., a centralized domain name registry.
The biggest problem is that your domain name can be blocked or taken away from you for arbitrary, unknown reasons or erroneously.
Anyone can write to a domain name registry, saying that your website is engaging in illegal activity. It would be a false claim, but the registry’s employee would have to block your site, even without having all the details to paint the full picture of the situation. This would inevitably lead to a lot of headaches and large losses.
TON Sites uses TON DNS, a fully decentralized domain name system.
Incumbent domain registries require owners to make non-trivial payments, which go to pay for employees and other expenses, whereas with TON DNS, all you have to do is make an annual micropayment as a symbolic “sign of life” to confirm domain ownership.
How to link a TON site to a domain
Sub-domains
Like regular sites, you can have a sub-domain for your TON Sites with the help of TON DNS.
To do so, you can use any suitable smart contract.
We’ve developed a few ready-made smart contracts.
With manual-dns smart contract a site’s owner can assign any page to any sub-domain.
If you’re the owner of a service, you can use the auto-dns smart contract. Users can register a sub-domain to themselves by paying a network fee and an optional payment to the service.
Say the social network place.ton allows Alice to register independently alice.place.ton for her personal page by paying a little bit of Toncoin.
You can go one step further and have a full-blown auction for NFT sub-domain — the same way the first “.ton” domains are distributed.
TON WWW
You can assign a wallet to your domain name
Let’s say you go to the http://foundation.ton site and want to donate 10 TON toward the network’s development. How would you do that?
It’s simple: Just send 10 TON from your wallet directly to this domain. No other payments or details are required.
The same is true for sub-domains. Let’s say you go to Alice’s personal page at alice.place.ton on the place.ton social network.
Send 10 TON as a gift to Alice by entering alice.place.ton as the recipient’s address, and Alice will receive the TON in her crypto wallet, which she assigned to her account when she created it.
Authorization
On the internet, you have to register and create a new and different password for every website. This quickly becomes annoying and inconvenient even if you factor in password manager apps. Inexperienced users defer to using one and the same password for all websites with which they interact, which is dangerous.
On top of passwords, log-ins require an email address or phone number that will immediately become the target of ads.
On TON, there’s no need to register. On a site or in an app, you can sign in with your TON-based crypto wallet — you won’t need to reveal your email address or create a different password for every new service.
Hyperlinks
The World Wide Web comprises internet sites of web pages, whose text can contain hyperlinks, which allows users to go from one resource to another seamlessly or to initiate some kind of action (e.g. open an email client).
TON Sites are similar to regular websites, but they’re accessible via the TON network. Their URLs also look similar to regular websites, but they end in “.ton” — e.g., http://foundation.ton.
TON has its own format for hyperlinks to initiate actions:
ton://domain/<method>?<field1>=<value1>&<field2>;..
For example:
ton://EQCD39VS5jcptHL8vMjEXrzGaRcCVYto7HUn4bpAOg8xqB2N/transfer?amount=1&text=hello
Clicking on this link will open the TON crypto wallet with the recipient’s address, the crypto amount, and any relevant data.
Web page developers can also use scripts that interact with your TON wallet or TON browser extension.
Everything mentioned above is what creates TON WWW: the collection of web pages and services on TON, which link to one another and are accessible in a TON crypto wallet and web browser.
TON Proxy
To gain access to the TON network, first, users must connect to a special entry point. In technical terms, this is called an “entry proxy.”
Currently, you can use public entry points launched by the TON Foundation.
Use public entry points along with HTTP for trial purposes only, as in this case, traffic outside the TON network is not encrypted
Tech-savvy users can already launch entry proxies directly on their devices — in the near future, this will become available to all users in the form of a simple application.
In a browser
Because TON Proxy is compatible with HTTP Proxy, you can simply open the settings in your browser or system settings and enter the address of a public TON entry proxy as a proxy server.
You’ll then be able to open “.ton” sites directly in your browser, just like regular websites.
Here’s a guide on setting up TON Proxy for various browsers.
Wallets
Things can always be simpler. Various TON wallets have said that they wish to implement TON Proxy directly in the wallet’s app to avoid downloading extra apps.
At the moment, this is possible through a MyTonWallet Google Chrome extension: Click to switch to TON Proxy, and your browser will be able to open TON sites.
This functionality will soon be available in the standard TON Chrome Extenstion, the Tonkeeper and other TON wallet apps.
The next steps
We’re awaiting two monumental updates dedicated to privacy and decentralized finance.
TON Proxy 2.0 — Privacy
In our opinion, the main red flag of the internet is that a user’s IP address and the site’s IP address are both open and visible to everyone.
In the TON Proxy 2.0 update, a new functionality will allow people to launch intermediary proxy nodes on the TON network; meanwhile, data between users and sites or services will travel through a swarm of intermediary nodes via garlic routing.
This will mask the IP addresses of users and sites completely.
Anyone will be able to run intermediary nodes. At that point, they’ll be free like TOR or I2P. This will allow a large number of users to try the technology.
Site security
Most websites, if it’s not a home page, use services such as CloudFlare or Akamai to mask the true IP address of a site and protect against DDoS attacks and hacks.
These kinds of services are good; however, they are centralized commercial companies. As it stands, these companies host a large slice of the internet, and when one of them experiences a critical emergency, it goes offline, turning off access to half the internet.
We see more stable and better solutions when the security of a site’s IP address is provided through the system of decentralized nodes belonging to TON Proxy.
Privacy for users
A user’s IP address is exposed by default. Not only can this be a vector through which hackers could gain access to someone’s device but corporations use these same means to glean massive amounts of data on users. By juxtaposing IP addresses, corporations can learn what sites you visit even if you haven’t created an account on it.
With TON Proxy, internet traffic will be rerouted through one of many intermediary proxies so that the end site or service will never know your real IP address.
Starting with the TON Proxy 2.0 version, full anonymity will be available in the TON network.
TON Proxy 3.0 — Decentralized finance
For the third stage, decentralized Toncoin economy will launch for the use of intermediary TON Proxies, which provide privacy to users and security to sites.
The payment will occur through the Payment Network technology, a network of payment channels developed in Q2 2022. An intermediary proxy node is going to receive micropayments for internet traffic packages — e.g., for 128 KiB — that run through it. These micropayments will be charged and deducted from users’ crypto wallets.
Thanks to this decentralized payments system, independent administrators will be able to run intermediary proxy nodes in various parts of the world, which will increase the effectiveness and speed of the network and make it more scalable and stable.
We believe that one of the main reasons why networks such as I2P or TOR haven’t been able to scale for 20 years is because of the absence of financial incentives for those who labor to support the network.
Conclusion
The modern internet has been operating on protocols developed in the 1990s — and some are even from the 80s.
We have to pay our respects to the first developers, whose many creations have stood the test of time: The internet was able to adapt to billions of users and new means to consume content.
However, privacy and security of that same modern internet have no response to the growing needs of the current day.
The internet managed to integrate deeply into our lives and will only go deeper. Video cameras on every street corner, fitness bracelets, self-checkouts in stores — all of these electronic devices monitor everything we do in our day-to-day lives.
As soon as this information falls into the hands of bad actors or thieves, it becomes a threat not only to our image or assets.
Already, detailed personal information can become a threat to our lives and the lives of people close to us. But soon, when electronic heart valves become connected to networks, it will become life-threatening — literally.
Another glaring issue is how large corporations have monopolized the internet. Infrastructure companies create narrow spaces, making the internet fragile. Corporations glean a huge amount of user data, which is sold to third parties or leaks in hacker attacks.
Today, we’re taking the first step toward solving this problem by opening the TON network to users and launching TON Proxy and TON Sites with TON DNS integration, all of which are decentralized, secure, and reliable services that surpass the familiar WWW in terms of ease of use.