{"id":52361,"date":"2021-11-05T09:00:00","date_gmt":"2021-11-05T07:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=52361"},"modified":"2025-09-03T09:51:40","modified_gmt":"2025-09-03T06:51:40","slug":"decentralized-web-3-0-search-engine-to-be-unveiled-at-lisbon-conference","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/decentralized-web-3-0-search-engine-to-be-unveiled-at-lisbon-conference\/","title":{"rendered":"Decentralized Web 3.0 search engine to be unveiled at Lisbon conference"},"content":{"rendered":"<p>On 5 November at 16:00 MSK, the Cyber protocol and the content-oriented search mechanism built on it will be unveiled, ForkLog said.<\/p>\n<p>The launch of the Bostrom network loader genesis block will be streamed at the Cosmoverse blockchain conference in Lisbon and via <a href=\"https:\/\/cyb.ai\/\" title=\"https:\/\/cyb.ai\/\">\u0441\u0441\u044b\u043b\u043a\u0435<\/a>.<\/p>\n<p>The search engine is designed to operate with Web 3.0 infrastructure. Unlike centralized search engines such as Google, in a decentralized search engine links to content form a knowledge graph in which peers exchange information as in a classic P2P network.<\/p>\n<p>According to the developers, this approach deprives the largest search engines of control over the results.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cIn Web 3.0 there will be no opaque algorithms for indexing links, no need for crawlers that collect information about possible changes to a site\u2019s content, censorship and vulnerabilities related to privacy loss,\u201d they noted.<\/p>\n<\/blockquote>\n<p>The Web 3.0 architecture envisions links to the content itself, rather than to the IP address or domain where it is stored.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cUsers of the decentralized search engine will be able to search content by hash, and after finding and downloading it will become another node in the content distribution network, reminiscent of torrent networks,\u201d the Cyber developers added.<\/p>\n<\/blockquote>\n<p>Content is recorded in the Cyber knowledge graph by performing a transaction with a linking data cyberlink. The transaction is validated using the Tendermint consensus, and the cyberlink is included in the knowledge graph.<\/p>\n<p>Every five blocks Cyber orders the content in the knowledge graph based on the cyberRank algorithm. It protects users from spam and <span data-descr=\"an attack in a peer-to-peer network, in which the victim connects only to nodes controlled by an attacker\" class=\"old_tooltip\">Sybil attacks<\/span> thanks to its ability to influence the ranking of all network participants.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cTo obtain V (volts) tokens, which will allow indexing content, and A (amperes) tokens for ranking, a certain period of time must be kept in the wallet with H (hydrogen) tokens, which are produced by liquid staking of the network&#8217;s main token \u2013 BOOT for Bostrom and CYB for Cyber,\u201d the developers said.<\/p>\n<\/blockquote>\n<p>Through tokens, Cyber users will gain access to resources of the knowledge graph and earn staking income.<\/p>\n<p>In June, the privacy-focused browser Brave launched <a href=\"https:\/\/forklog.com\/en\/news\/brave-launches-beta-of-its-private-search-engine\">beta version of its own private search engine<\/a>.<\/p>\n<p>Follow ForkLog on <a href=\"https:\/\/www.facebook.com\/forklog\" target=\"_blank\" rel=\"nofollow noopener\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On 5 November at 16:00 MSK, the presentation of the Cyber protocol and the content-oriented search mechanism built on it will take place, ForkLog said.<\/p>\n","protected":false},"author":1,"featured_media":52362,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[130,1424,1110],"class_list":["post-52361","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-decentralization","tag-protocols","tag-web-3-0"],"aioseo_notices":[],"amp_enabled":true,"views":"10","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/52361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=52361"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/52361\/revisions"}],"predecessor-version":[{"id":52363,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/52361\/revisions\/52363"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/52362"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=52361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=52361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=52361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}