Don't get phished. There is no announced token sale. Beware of anyone claiming to sell Marconi tokens.

Core Technology

The Marconi protocol is designed down to the ethernet level and powers a
decentralized networking stack that provides privacy, security, net neutrality and
upgradability

ethernet-level
encryption

Secure communication pipes established at Layer 2 of the OSI model provide packet-level encryption that’s more secure than just using SSL and TLS

Programmable Packets

Decentralized apps with direct access to network packets provide network administration and security functionality without expensive custom hardware

Branch Chains

Branchable blockchains enable the creation of new decentralized networks without traditional infrastructure that's controlled by just a few entities in any given region

Learn more about the Marconi Platform

Use Cases

Network Admin Apps

Create administrative applications for network load balancing, changing network topology and IOT device management.

Virtualized Blockchain

Jump start new blockchains that leverage the Marconi Network for secure block creation and persistence.

Security Apps

Create decentralized security apps like Anti-Phishing, Anti-Malware, Intrusion Prevention Systems and dVPNs

Token to Blockchain Migration

Migrate token projects (i.e. ERC20) to their own chain where the tokens now provide utility by powering the blockchain

Dynamic Networks

Rapidly deploy dynamic networks in battlefields and disaster recovery areas. Record network activity on a ledger for after action reviews.

IOT Device Management

Develop apps that address security, privacy and connectivity issues for IOT device management.

Developers

marconi applications

Write decentralized applications using Marconi Script, a Turing-complete language with access to network packets.

Decentralized Apps can be submitted to the global chain or branch chains for public and private networks.

marconi library

APIs enable traffic routing, packet analysis, pattern recognition, branch chain creation and token migration.

Get early access to the SDK

sample code

Establish policies to determine what type of traffic is permitted on the network
  1. Contract IntranetFirewall {
  2. Init(Address target_address) {
  3. TunnelRef handle = mOpen(target_address);
  4. mApply(handle, {AllowOnlyCorpOrHTTPS});
  5. }
  6. }
  7. Status AllowOnlyCorpOrHTTPS(PacketRef packet) {
  8. if (packet.src().port() != 443 &&
  9. !packet.src().url().as_string().match('intranet.example.com')) {
  10. return Status::UNSAFE;
  11. }
  12. return Status::OK;
  13. }
  1. Contract IntranetFirewall {
  2. Init(Address target_address) {
  3. TunnelRef handle = mOpen(target_address);
  4. mApply(handle, {AllowOnlyCorpOrHTTPS});
  5. }
  6. }
  7. Status AllowOnlyCorpOrHTTPS(PacketRef packet) {
  8. if (packet.src().port() != 443 &&
  9. !packet.src().url().as_string()
  10. .match('intranet.foo.com')) {
  11. return Status::UNSAFE;
  12. }
  13. return Status::OK;
  14. }
Spin up a new virtualized blockchain network in just a few lines of code
  1. $ marconi branch foo
  2. >>> Success. Created branch foo.
  3. $ marconi status --branch_name=foo
  4. >>> Branch foo: uninitialized.
  5. $ marconi init --config=/tmp/config.txt --branch_name=foo
  6. >>> Success. Configured branch foo.
  7. $ marconi run --branch_name=foo
  8. >>> Success. Running branch foo.
  1. $ marconi branch foo
  2. >>> Success. Created branch foo.
  3. $ marconi status --branch_name=foo
  4. >>> Branch foo: uninitialized.
  5. $ marconi init --config=
  6. /tmp/config.txt --branch_name=foo
  7. >>> Success. Configured branch foo.
  8. $ marconi run --branch_name=foo
  9. >>> Success. Running branch foo.
Analyze network traffic for phishing attacks such as masquerading URLs with unicode characters
  1. Contract PhishCatcher {
  2. Init(Address client_address) {
  3. TunnelRef handle = mOpen(client_address);
  4. mApply(handle, {PhishFunc});
  5. }
  6. }
  7. Status PhishFunc(PacketRef packet) {
  8. if (packet.src().url().as_string().match('[^\u0000-\u007F]')) {
  9. return Status::UNSAFE;
  10. }
  11. return Status::OK;
  12. }
  1. Contract PhishCatcher {
  2. Init(Address client_address) {
  3. TunnelRef handle = mOpen(client_address);
  4. mApply(handle, {PhishFunc});
  5. }
  6. }
  7. Status PhishFunc(PacketRef packet) {
  8. if (packet.src().url().as_string()
  9. .match('[^\u0000-\u007F]')) {
  10. return Status::UNSAFE;
  11. }
  12. return Status::OK;
  13. }