Oyster new paradigm: work whit Ethereum and IOTA togheter!

Check more about Oyster on:
Oyster is the new paradigm for the internet economy that breaks the stalemate between advertisers and ad blockers. Website owners add the one line Oyster code to their site HTML to turn their visitors into treasure hunters that search for Oyster Pearls: the PRL token. Treasure hunting means a visitor’s browser performs light Proof of Work micro-puzzles that discover embedded PRL in the encrypted data maps of uploaded files. Storage users spend PRL to reliably and anonymously store their data as website visitors’ browsers maintain the retention of such data whilst hunting for the spent PRL.
Bruno block is maintaining anonymity to preserve the decentralisation of the project. “People refer to me as an initial reference point for the functionality and nuances of the independently defined protocol. If I were to be compromised via coercion, it could inflict too much damage on the project during it’s infancy.”
Robust, Redundant Data Storage
Files uploaded via Oyster are stored on the IOTA Tangle. This means that an excess of redundant duplicates are stored throughout the network topology of the Tangle, therefore mitigating the threat of data loss. Nodes running the Oyster Protocol perform Proof of Work to guarantee that the Tangle retains the data.
Dual Ledger Integration
The IOTA Tangle (Directed Acyclic Graph) is used for data retention and Proof of Work negotiation between Nodes. The Smart Contract technology of the Ethereum Blockchain is used to produce Oyster Pearls (the token), therefore activating the unique token attributes that enables Oyster operation.
Treasure Hunting Algorithm
Oyster Web Nodes perform Proof of Work to search for embedded Pearls on the Tangle, which inadvertently commits the user uploaded data to the Tangle. It’s like how a bee tries to get the sweet nectar of a flower, so it inadvertently pollinates the flower with the pollen on it’s body. All activity across the Oyster network is economically motivated, no aspect of the Protocol relies on altruistic actors.
Zero Knowledge, Anonymous Storage
No personal information, usernames, nor passwords are ever used. Each uploaded file is assigned a unique handle, which acts like a private seed key. Anyone that has the handle can retrieve the data from the Tangle, even if they were to use their own custom-built script and Tangle Node. Mixer contracts on the Ethereum Blockchain can conceal who paid for the storage.
Open Source, Extendable, & Auditable
The Oyster Protocol is developed in a community driven model without any single point of failure. Extension projects can be built on top of the mesh-net topology and protocol API. This enables a whole class of truly decentralized applications to be built; such as decentralized telephone calling. Anyone is able to develop clients or extensions without permission from a central figurehead.
Intrinsic Storage-Pegged Value
Oyster Pearls are the bridge between the motivation of a user to spend money on reliably storing data and the motivation of a website owner to cleanly monetize their web content. The Pearl Token (PRL) is unlike any other coin, it is intrinsically pegged to the market value of storage prices without requiring a reserve to back it up. The crowdsale price is offered at a fraction of storage prices, therefore early investors earn profit with low downside risk.