# Introduction

Nimona’s aim is to create a data-centric network that enables users to use compatible applications to create and share data without being restricted to the application that created them or having to force other users to use the same application to access them. Users are always in control of their relationships, their data, and who they share them with.

It provides a number of very opinionated layers from networking, communication, and identity management; to application level layers for managing permissioned static or dynamic data.

Often users will move between services or use multiple services at the same time that provide similar amenities either because of missing features or in order to be able to share data with users that prefer (or simply just ended up on) another service. Over time most of these services will get abandoned by their developers or users, will change into something else, or simply die off. This results in data and relationships being left behind and eventually lost.

# Identity

Users get an identity they can use across multiple applications and services. Your identity belongs to you and you control who can access what information in your profile. You can use your identity in any compatible application.

Your friends and other people you communicate with also don’t usually change. All your relationships come with your identity no matter which application you are using.

# Interoperability

Applications can create, manage and share data that can be used by other compatible applications. Alice can send messages to Bob without having to know or care what messaging application Bob uses. An initial registry of common data types allows compatible applications to exchange data between them, extend the existing types, or create new ones if they need to.

# Ownership

The data you create, ie articles, conversations, photos and status updates, are only shared with the people that you give access, or you can decide to make some of them publicly accessible.

Data are stored either on the devices where your applications are installed, or online services you have authorized to hold a copy of your data. When you authorize a new application and give it access to your data, it will be able to talk with any other services that have access to the same data, and retrieve the data it needs.