REAL FREEDOM
BEGINS WITH
TRUE PRIVACY

Get all the latest news from Privum

THE PRIVUM NETWORK

A decentralized network enabling anyone anywhere in the world to reclaim their privacy and Internet freedom without fear of disruption, surveillance or persecution.

A global reference in privacy
and digital security

Privus was established in Zug, Switzerland in January of 2016 to provide Privacy-as-a-Service for governments, businesses and high net worth individuals, and has proven its trustworthiness, integrity and unmatched security in the digital privacy field.

Privus’s flagship product SecurLine, was built with privacy at its core to be the most advanced, secure and transparent encryption application for smartphones, offering high quality and high definition voice and video calls, conference calls, text and image messaging.

SecurLine underlines our commitment to privacy, first and foremost, and speaks to our recognised ability to develop innovative solutions that ensure maximum security and bulletproof privacy, are of the highest quality and very easy to use.

With existing, high-end products and clients worldwide, Privus now seeks to build a new underlying infrastructure for the Internet – the Privum Network – that will not only add a further layer of security and anonymity to its product portfolio, but is set to revolutionize the fields of privacy and digital security.

SecurLine may be acquired from Privus at a significant discount by using PRV, and is available to download in the Apple and Google stores.

THE PRIVUM NETWORK

privum-network6

Secure, peer-to-peer incentivized network, built on blockchain, employing the most advanced cryptographic and stealth technologies.

Blockchain

Decentralized and secure blockchain network for node registration and service transactions.

Onion Routing

Onion Routing to hamper traffic analysis and protect anonymity.

Post-Quantum Encryption

We employ end to end encryption using post-quantum algorithms to protect the network against future attacks on the horizon.

Incentivized

Self-sustained peer-to-peer incentivized network, without any intermediary fees.

AI Reputation Scoring

Node reputation scoring via machine learning.

Open Source

Open source code, published on Github and auditable by 3rd parties.

usescases

USE CASES

What happens in Privum stays in Privum
Trading

The accomplished Wu Cheng is fascinated by open blockchain technology and keen to use crypto-currencies and to see for himself their impact in the real world, their ability to reach the unbanked and to help send money to his aging mother without having to pay a fortune to or seek permission from intermediaries.

Read more…
Recently, his government decided to ban all access to crypto-currency exchanges, instructing national regulators to block all attempts to access these now restricted services and websites. Luckily, Cheng has heard of the Privum Network and directs his efforts to acquiring PRV. Once this is done and he is online on Privum, Cheng can reclaim both his ability to access any website he wishes as well as his privacy.
Internet Privacy

John is a young man attending a prestigious University in the USA. He aspires to run for political office one day. Like most young men of his age, he spends a significant part of his day online surfing various websites, some of which are deemed not safe for work.

Read more…
He is completely oblivious to the fact that all his browsing habits are tracked by his ISP and sold on to data collectors thus providing the Big Data algorithms with very invasive details about his private life. With the recent inescapable media coverage given to the scandal involving the use of personal data on Facebook by Cambridge Analytica, John has become aware of the risks faced by any individual browsing or surfing the Internet. He is unwavering in his belief that privacy should be protected as a fundamental human right and vows to advocate for appropriate legislation once he is elected, allowing anyone to use the Internet without fear of exposure, surveillance and even blackmail. In the meantime, he is determined that his private data will not appear in a hacker’s data dump on the internet, or be taken out of context, thereby ruining his carefully constructed public image. He opens the Privum application on his tablet and surfs the World Wide Web in complete privacy. Neither his ISP nor anyone else has any way of knowing where he surfs, and any reputation risk is thus mitigated.
Video-streaming

Manuel, a waiter from Barcelona, is travelling to India on his holidays and wants to watch his favourite Spanish show on a video-streaming platform, but the provider is geoblocking access to that specific show in India due to licensing rights.

Read more…
Manuel downloads the Privum application onto his laptop and, following an unexpectedly easy log in process, fires up his new PN and selects Spain as its exit location. He sees that the rate per gigabyte consumed is 1.5 PRV, which he is able to acquire using the application, and decides to connect to the Privum Network. Now he can happily watch his show.
faq

FREQUENTLY ASKED QUESTIONS

What exactly is the Privum Network?

The Privum Network is a new blockchain-enabled platform, layered over the existing Internet, that enables private, secure and censorship-resistant access to the Internet anywhere in the world.

To build this network we will develop Privum Nodes (DApps) that anyone can run on their computers and mobile devices.

Why would I need to use Privum?

The Internet is increasingly subject to censorship, disruption, surveillance and the collection and distribution of private data by third parties. Existing solutions to these types of controls are, in many cases, insecure and often unreliable. The Privum Network will allow users – “Buyers” – to browse the Internet securely, while safeguarding their privacy.

Additionally, the number of broadband connections continues to increase worldwide and most of these connections are often underused.  Privum permits and incentivizes users – “Sellers” – to share their excess bandwidth with the wider community in exchange for PRV.

In short, as a Seller, you will earn PRV by sharing bandwidth with the Privum Network and, as a Buyer, and you will be able to use the Internet securely and in the knowledge that your privacy is being protected.

What happens to my data if I don’t use Privum?

It will continue to be collected, distributed and stored by ISPs and other corporations, government agencies, and even criminal organizations and hackers in multiple data bases across the world, feeding the Big Data algorithms that increasingly influence and run our lives. That includes your IT bosses at work, a bad employee in your ISP and/or the unfriendly hacker next door. The tendency is for this abuse of private data to increase and its perverse effects will become more and more apparent as the inevitable breaches of private data and the ensuing scandals demonstrate the breadth and depth of data collected and just how vulnerable it is.

The situation is worse with regard to metadata – data about data – which is produced on a daily basis, is growing exponentially, is easier to collect and analyze and the production of which, with the exception of tools such as the Privum Network, is practically unavoidable.

Privum reduces the amount of metadata generated by its users and minimizes any potential leakage of that metadata (that which is discoverable), ensuring the privacy of its users.

What is metadata and why is its leakage a threat to privacy?

Metadata is simply data about data, such as who is talking to whom, where from, when, for how long and from which device. It gives context about data but is not the content itself.

When a phone call is made or a message or email is sent, two distinct types of data are transmitted: the content of the communication and metadata. Most cybersecurity solutions only concern themselves with protecting the content of communications against wiretaps, usually through some form of encryption, but ignore the significant threats to privacy from metadata.

The risks posed by massive and systemic metadata collection practices pose a serious problem in the fight to restore our privacy and combat the abusive and, sometimes, malicious use of our data. If sufficient metadata is collected, it can be comparable to an individual’s data fingerprint. Contrary to public perception, this type of situation has already achieved the predictable chilling effects that metadata-driven control is bound to entail. Beyond the tools of social control, metadata is also used extensively in classic forms of warfare. As former NSA and CIA Director General Michael Hayden publicly stated, “We kill people based on metadata.

How does Privum protect my metadata?

The Internet was not designed to protect metadata, so preventing its collection is impossible unless a different infrastructure on top of the Internet is used. This is what we do at Privum, where we employ various tools, such as end-to-end encryption, secure onion routing and the randomization of exit node pools, to ensure metadata leakage is minimized, preventing the usual metadata interception problems that plague the Internet.

What is Post-Quantum encryption?

One of the more signifiant shortcomings in today’s cybersecurity space is the predominant “head-in-sand” attitude regarding the likely development of Quantum Computing (QC) some time in the not-so-distant future.

At Privum we believe privacy needs to be protected not just in the present, but also into the future. That is why we over-engineer our encryption to make it as resistant as possible to the inevitable threats to current cryptography posed by QC.

With the introduction of QC, most of the encryption currently used worldwide (by everyone from governments to the private sector) would be instantly vulnerable, resulting in massive privacy breaches. This means that all your current, and past, encrypted content (for example emails, browsing history, messages, encrypted files in the cloud) sitting in multiple databases worldwide could be retroactively decrypted.

In this cryptopocalyptic scenario, the encryption used on Privum Network would remain unbroken. For more detailed information on the cryptography and encryption deployed on Privum, please refer to the White Paper.

What fees do you charge?

None. Privum collects no transaction fees, neither does the EOS blockchain upon which the Privum Network is built – one of its unique characteristics.

All exchanges of PRV between nodes are enabled through a smart contract, strictly peer-to-peer between buyers and sellers of bandwidth and completely free.

Paying fees to intermediaries is incompatible with our goal to create a global, incentivized peer-to-peer network which ensures privacy and is run by the community; fees would run contrary to incentives built into the Privum Network to promote rapid global adoption and demand-supply equilibrium, and would go against the spirit of the blockchain revolution.

What are PRV and what can they be used for?

Privum Tokens, or PRV, are the sole means of access to the Privum Network. Their purpose is to incentivise users to run Privum Nodes and share their spare bandwidth with the wider Privum Network, thus creating a scalable, global, peer-to-peer community with built-in incentives that promote the expansion of the network and reinforce its resilience.

PRV can also be used to acquire existing products and services like SecurLine from Privus (Privum’s parent company) at a substantial discount.

How do I acquire PRV?

We will keep you informed as to how and when you will be able to acquire PRV.

Can I mine PRV?

No. The concept of “mining”, taken from Bitcoin’s model of Proof-of-Work, works very differently on Privum.

In our context, mining would mean sharing of spare bandwidth to the Privum Network in exchange for PRV. “Miners” on Privum are designated as “Sellers” and do not need to perform any energy intensive or computationally expensive operations as is common on other blockchains, or require any additional equipment.

Any user of the Privum Network can become a Seller if they are willing to share their bandwidth with the community. This mining is what helps the network grow into a truly scalable and global peer-to-peer network able to defeat sophisticated censorship techniques. The more extensive the Privum Network, the greater its ability to counter the limitations encountered on the Internet and to benefit the whole Privum ecosystem.

What stops Privum from being a darkweb for criminals?

As our CEO, a former intelligence officer and law enforcement professional, will tell you, we are developing Privum to protect the right to privacy, not to facilitate illegal activities, and we have been careful to structure the development of the network so as to protect it and its global community of users from abuse by the criminal element and malignant actors or governments.

We will do this by actively promoting and incentivising the decentralisation of the network and through the monitoring functions of Privum Guards and a system of reputational scoring for Privum Nodes.

Furthermore, like Bitcoin, our blockchain will be open and public, an additional deterrent against criminal and nefarious users.

We would add that, despite their negative connotations, darkweb-type infrastructures are mostly used by nation states, corporate entities, investigative journalists and others to protect their private data from illegal surveillance, political and industrial espionage and mass collection by Big Data.
For more information on Privum Guards, reputational scoring and the limitations of current darkweb-type infrastructures, please refer to the White Paper.

What if my Privum Node is used for immoral or illicit activities?

Given Privum’s global nature and the difference in legislation between jurisdictions, we have opted to address the subject with a three-pronged approach:

1) Blacklisting – Sellers will have the option to blacklist certain types of Internet sites or services, which they do not wish their Privum Node be used to access;

2) Plausible Deniability – Privum will develop Proof-of-Work-based cryptographic evidence that establishes when each exit Privum Node is used by the Privum Network and, consequently, when traffic originating from a specific Privum Node onto the Internet cannot reasonably be attributed to the owner of that Privum Node;

3) On-going Support – Privum will actively support users facing any issues as a result of their Privum Node being used for illicit activities.