Sociogram — a social network, focused on decentralization and security. It is based on the principles of Web3 and freedom of speech, which allows you to own the content. This is the main difference from other traditional social networks.
How does Sociogram work?
With Sociogram you can chat, create, share your own content and search for users with similar interests.
The project is ideal for users who want to freely create and share their content, as well as express any opinion without restrictive algorithms or a shadowban.
Sociogram uses blockchain technology to store user content in the ERC1155 token standard. With this technology, users own their content, unlike traditional social networks. All users can log in only through Web3. This authorization method allows users to log in quickly and easily without exposing personal information such as email or personal phone number, which are susceptible to data leakage. The project only stores the username and address of the public account.
At the moment, the Ethereum blockchain is used, as this network is more decentralized and convenient for most users. Developers use NFT (ERC 1155) and IPFS technologies to store user content.
How to create a profile:
1. | Click the "Login" button. |
2. | Connect the wallet extension (Metamask or ConnectWallet). |
3. | Verify your address with a digital signature. |
Authorization with a wallet extension allows you to quickly and easily log in without revealing any personal information.
A wall - a free space where you can post information, add content and share it with other users. Click on the icon to create a new entry in the wall section. As the window of creation entry opens, enter your text. Click the "Publish" button.
To subscribe to a user, you must open the user's page and click the "Subscribe" button.
Security
Chats in the "Messenger" section are always end-to-end encrypted. This means that only you and your recipient can read them. You don't have to choose a security level for communication: your messages are always encrypted with unique keys. Encryption and decryption keys are individual for each user, which increases the level of communication security. The project creates a new reality, where personal data is always persona.