Replying to 31b12bcf...

nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqaqakd28d95muqlg6h6nwrvqq5925n354prayckr424k49vzjds4snemj6y What sort of protections do you have against a state actor compromising enough nodes to track traffic through the peer network? TOR has been compromised in this way in the past.

There are typically around 50,000 nodes active at any one time, it costs money ($MYST) to connect to them, if a state wants to spend huge amounts of money trying to connect to 50,000 random nodes each day day upon day, then we'll all get rich and the state will get significantly poorer.

If they want to run nodes, then they can capture some of the traffic for sure.

Tor is free to use and a much easier proposition, but still reports of its compromise have been vastly exaggerated.

If you prefer centralised companies, then this is an option:

https://letsvpn.world/?hl=en

I would suggest, however, that the ability for a government to capture a single company is significantly easier than a decentralised network.

They have managed most of the large tech companies, smaller VPN providers are child's play by comparison.

There is a third option, which is a Tor like service run by two separate VPN providers, Obscura and Mullvad.

Obscura sits in the middle of Mullvad and so neither operator know both the source and destination of the traffic they handle.

Obscura is only available as a Mac download currently, but it is open and you can implement their solution on Wireguard:

https://mullvad.net/en/blog/mullvad-partnered-with-obscura-vpn

https://obscura.net/

Reply to this note

Please Login to reply.

Discussion

nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqaqakd28d95muqlg6h6nwrvqq5925n354prayckr424k49vzjds4snemj6y Thank you for the excellent information. I'll do some more research on MysteriumDark. I'm not familiar with crypto, but it looks like it's time for me to start learning.