What is zkSync.LIMO?

A privacy preserving ZNS gateway for resolving zkSync Name Service (ZNS) records and associated IPFS/IPNS/Skynet content (Web 3.0). LIMO allows users and dApp developers to effortlessly access and host static sites built with a combination of IPFS/IPNS/Skynet and ZNS.

Why do we need zkSync.LIMO?

Core internet infrastructure is becoming increasingly centralized and as such, several existential threats have emerged that undermine the principles of an decentralized, open and free internet:

For end users, this means a limited selection of poor quality services that increasingly resemble a cable TV package.

The LIMO project brings additional resiliency to dApps by providing an alternative means of access as a public good. Application owners can directly participate in the roadmap of LIMO, giving key stakeholders influence over the services they depend upon. As the decentralized web continues to grow, it is imperative that community projects facilitate the transition from Web 2.0 to Web 3.0.

How does zkSync.LIMO work?

LIMO operates as a reverse proxy for ZNS names and IPFS content.

LIMO uses a wildcard DNS record *.zkSync.limo to dynamically capture requests for all ZNS domains. The LIMO service automatically resolves the IPFS/IPNS/Skynet contenthash of the requested ZNS record and returns the corresponding static content over HTTPS. Since native IPFS/IPNS/Skeynet resolution capabilities are missing from the majority of browsers, zkSync.LIMO represents a bridge from the “normal” internet to the decentralized one.

Zero-configuration is required in order to access or host a site or dApp on zkSync.LIMO, making zkSync.LIMO an excellent no-cost solution for providing Web 2.0 access to your project.

Security and Privacy

The LIMO project enforces strong origin isolation policies for all resources by default. Projects accessed through zkSync.LIMO automatically receive security hardened browser headers and all client data is encrypted with TLSv1.3 (default) or TLSv1.2 using the latest ciphersuites. All log data is fully anonymized, which prevents the ability to uniquely identify any single user.