Introduction to the Cyber Project

Trying to decode and demystify Cyber can be both a compelling and challenging task. In a recent interaction through the Telegram group of Cyber entitled #fuckgoogle Ι said that trying to understand Cyber is like reading Bakunin on cyberspace.

However, by viewing Cyber’s Github material and e.g. the document entitled Cyber Homestead Documentation, the reader can come upon the realisation that a terrific amount of work has been devoted on a theoretical and philosophical level as well as on a level of technical expertise.

Yet, to a non tech-savvy person this project can be intimidating.

The purpose of this article is

a. to explain (in a less technical language), what Cyber is about, and

b. to eliminate the search required in order to locate relevant info, by directing the reader to relevant pages and sources of information.

Please note that this article does not claim to understand the project better than others. It is merely an attempt to provide some basic info in as simple a language as possible.

Also since this is a work in progress, the article will be updated with more questions and corresponding answers down the road.

1. What is Cyber and How Do I Use it?

The following infographic contains clips from the video-explainer of Cyber.

Cyber Network’s ambition and purpose is to be a self-sustainable super-computer for providing answers. It aims to perform Google’s tasks in a more sophisticated and less centralised manner. As a matter of fact it is a totally decentralised network.

It will be managed by its users (us) and aims to provide an open alternative for Web 2.0. According to the team behind Cyber:

Its architecture resembles an AI organism, in that it can learn upon the data it is fed with and provide answers, without blackbox intermediaries.

Currently, there are two open-source and functioning apps built on top of Cyber.

A decentralised Google alternative and a decentralised Twitter alternative.

Cyber is still in test net so it is still on a primitive and early form.

For some more information and documentation on the project please check: https://cyber.page/brain/help

A few questions that may immediately come to mind are the following:

How is CYBER different to Google?

Why use CYBER instead of Google?

How/Where can you search for answers?

How can you add content to CYBER personal or other?

How much info exists on CYBER today?

How can you control or commercially exploit your info on CYBER?

Can you delete the content you create?

How is CYBER different to Google

A comparison table drawn by user serejandmyself shows what Cyber does and how it is different to Google:

Cyber is, in essence, a protocol (a process that instructs computers to do things in a certain way) namely:

a. searching and

b. adding information, onto a knowledge graph (a compilation of facts about X that provides meaning to the user). It subsequently ranks this information according to relevance. In other words, it’s a decentralised Google.

It is important to note that Cyber exists on a blockchain and one main difference to a traditional search engine is that it searches for content only (and not across conventional hyperlinks) thus enabling the elimination of censorship.

The biggest difference is that data, namely keywords and content are added by users.

Why use Cyber instead of Google?

The Cyber team’s vision and purpose is twofold:

a. to decentralise web services including social media, search services, e-commerce which according to the Cyber team’s understanding:

“are all based around semantics (the meaning and the relation of words and objects). The problem is that the current semantical core, that we use every day, is built pretty much by one company, allowing it to sell data, provide users with misleading information and to effectively censor data”.

The above brings us to the second purpose of existence for Cyber,

b. the creation of open semantics vs the closed semantics of Web 2.0.

How/Where can you search for answers?

For commencing with searches you will need to navigate to https://cyber.page/ and press the symbol with robot head on the top right.

For a useful guide and How-to please visit:

An example of search results is provided in the following links:

a search example: https://cyber.page/search/cosmos

or: https://cyber.page/search/citizen%20cosmos

or: https://cyber.page/search/serejandmyself

If you need to further get educated on cyber.page please visit:

One limitation of Cyber is that in order to interact with Cyber you will need fuel tokens.

For a guide on how to acquire these tokens, please visit the following section:

Right now this is the biggest obstacle to using cyber and the Cyber team’s aim is to provide the ability to users to utilize Cyber without e.g. the use of hardware wallets and complex processes. It is anticipated that Keplr wallet will be the first extension to allow to sign a transaction with a cyberlink creation without a hardware wallet or the use of a command line interface (CLI). Afterall, the core idea is for Cyber to become a simple tool that everyone will be able to use.

How can you add content to Cyber, personal or other?

The mechanics of adding content are as follows: In order to add anything to the graph, the users need to use IPFS hashes (hash is simply an encrypted pointer to a certain value that lets us make sure that what is pointed to is actually what is pointed to and not something else). Users use the 2 links to create what we call a cyberlink. A cyberlink is exactly what is described above, a link between the X and the Y, where X is the keyword and Y is the content.

Cyberlinks, are in principle, a semantic construction between 2 points: From and To, namely 2 hashes of info.

There are two ways to create content:

a. Through third party tools as explained here:

b. Through a process natively as explained here:

How much info exists on Cyber today?

Currently, according to the data acquired from https://cybercongress.ai/, the following data exists within Cyber:

How can you control or commercially exploit your info on CYBER?

By default one cannot exploit the data submitted within Cyber. On the other hand, since one owns their data, they could, in theory, sell it to Cyber token holders. Still this is a very theoretical approach.

Can you delete the content you create?

Here we need to understand that content creation is divided in two parts:

  1. The transactional data going through the blockchain for putting the content up
  2. The actual content (image, doc file etc.) that is currently shared through/stored on IPFS.

Transactional data is immutable, so once the transaction enters into the blockchain, it cannot be deleted.

In regards to the content shared ( which is currently stored on IPFS), and not the transaction of sharing it, it is possible for the person who added the content to stop sharing it.

On the other hand, if a person adds data to the network, and another node chooses to rehost it, there is no way to cause them to delete it from their blockstore.

This may give rise to privacy concerns as a malicious actor could e.g. disclose private info about a person, or submit fake information about person etc.

Yet, freedom of speech appears to be one of the prevalent values of the Cyber team as it is apparent by their declaration on their decentralised Twitter alternative:

It follows that Cyber makes a proposition in a similar fashion to John Perry Barlow’s Declaration of the Independence of Cyberspace in 1996.

2. Token Economics

The native token of Cyber is CYB (currently on test net) and will be running on a Cosmos SDK/Tendermint sovereign blockchain. The genesis block of the Cyber network contains 1 000 000 000 000 000 CYB. For more information please see the graph below:

https://ipfs.io/ipfs/QmQ1Vong13MDNxixDyUdjniqqEj8sjuNEBYMyhQU4gQgq3

3. Governance

Governance on Cyber Network is inspired from the Cosmos Network’s governance mechanisms. Cyber Network is a decentralised protocol and as such it is not owned by one entity, but rather it is governed by its stakeholders, who can, in turn, decide on its development via governance (voting).

Thus when a proposal is live, there are 4 options for voting (please note only delegators validators, people staking or validating transactions that is, can vote):

  • Yes: vote yes for the current proposal;
  • No: vote no for the current proposal;
  • Abstain: vote neither yes or no, but cast a vote. denoting you are a responsible stakeholder and care about the the protocol;
  • No With Veto: vote no on the proposal and Veto it, meaning you have a strong opinion against it going forward.

For more details on Cyber Network’s governance mechanism please see:

4. Why Do the Cyber team Do this?

According to their claim:

We are trying to solve the problem of data centralization and data censorship. Which in other words, is decentralization of common knowledge (assuming that data is the new knowledge and that we are moving into the digital age). Each person should be able to control their own data, their identity, their knowledge. The world can become a better place if our children live in a digital environment where they are in charge of their actions.

Search is a global mechanism that is globally understood by everyone, regardless of language, race, age, etc. It is somewhat a basic instinct (searching for food to survive etc). In the digital realm with the help of search, we gain answers to our questions, which we always ask. Search helps us to build a model around any subject that is of interest to us. With the use of search, we can build databases, which can lead to a great number of useful instruments .

5. Useful Links to Sources of Information

For more info on documentation, sources of information etc. please visit: https://cyber.page/brain/help

Written by

Blockchain advocate & sceptic | Cøsmos denizen & degenerate ⚛️ | Organic grower & physiolater 🍃

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store