• 2 Posts
  • 13 Comments
Joined 1Y ago
cake
Cake day: Jul 30, 2023

help-circle
rss

it should work on firefox with a VPN tho, unless you are blocked by cloudflare…

It’s a secure cloud storage, so having a webpage is not exactly possible. Probably the browser failed to decrypt the file, which shouldn’t happen on a normal firefox (I use it)


Look into IPv6 ephemeral addresses

Sounds good! But does it provide encryption tho?


If I’m understanding this right, it would require every router to effectively be a proxy

EXACTLY

They’d still be able to setup a surveillance network inside of ISPs to watch the exchange from A -> B -> C

It will be super hard as the packets are not easily uniquely identifiable, and basically impossible if multiple countries are involved. It’s the same like trying to take down/block Tor.


I’m fine with that, and that’s not censorship as far as I’m concerned

I believe that is a form of censorship, hlocking a whole exit node only because it’s used for hacking… it’s like blocking a country because most of the users from the country are haters


IP adresses aren’t fixed (for most people), just disconnect your modem for a few hours and you’ll probably get a new one.

The issue is not that it’s static, the issue is that it is getting assigned by an authority. In the solution the random ID is generated on device

You are being tracked by cookies, browser fingerprints, only being able to use a website after logging in, etc.

Although that is possible, my understanding is that the most significant information regarding one’s location and identity, after an account, is the IP.


know how to route this new protocol without IP addresses

A ptoperly implemented solution will be able to route packets without IP, I believe

We can’t even get mainstream ISPs to support IPv6 in the last 25 years.

Yeah, I don’t know if it will be taken seriously. But if then It’d be nice.


Also, this sounds like it will require way too much intelligence in the network itself

Yes that can be a disadvantage


isn’t that an overlay network running on Top of IP? can’t someone just deny access?


what if someone is using Tor to hack your services? Then you will be blocking Tor exit IP,therebty also censoring Tor users.

Overlay networks like Tor has another problem too, you will have to trust the network nodes, and someone can just run a lot of nodes to control a big portion of the network, or can just deny acces to the network.


Read the doc, what are your thoughts?
fedilink

maybe not today or tomorrow, but having an idea floating around helps people consider it in the far future if an architectural change becomes necessary




This is a concept, frankly I don’t think our govts or corpos will have any interest in this 😂 but we need to think privacy at a network level


please read the attached doc and give your feedback..
fedilink