The library is now OPEN, the real Secure, Private and Unblockable VPN

Open-source VPN library — Letting YOU BUILD a p2p, key-based addressing w/ functionally unblockable multi-hopping VPN tunnels for your application with the I2P network. Resistant to traffic analysis and blocking.

RTrade is excited to share our truly decentralized anonymous virtual private network (dVPN) that combines both privacy and performance to provide trace-less security. It time not only to take back control of our data with Web 3 technologies such as blockchain and IPFS, its also time to take back our right to privacy around the world. This open-source library is for providing and connecting to VPN’s over the I2P network. Daemon, web client, and terminal client. This is an automatically configuring, automatically deploying, automatically multi-hopping pseudonymous VPN. Read more below and also dont forget to check out our I2P IPFS gateway, a gateway that respects your right to privacy.

Libanonvpn Anonymous Private Network Adapter. Private networks with limited resources.

VPN clients and servers are addressed by keys, which are then translated into IP addresses, which any application can use. These keys never need to change unless the private keys are lost or stolen, so unlike IP addresses, they will never change unexpectedly and unlike dynamic DNS, there is no wait time or unreliable configuration to deal with when a device is physically moved. Every single device on your VPN can be mobile(Although because it is based on I2P, longer run-times=greater speed and reliability, so it still helps to have fixed nodes).

Decentralized Privacy

All modern commercial VPNs require the user to trust the VPN provider, which represents a central point of failure. In order to avoid concerns about VPN providers sharing account information or manipulating users, RTrade has designed a system that anonymously routes all incoming and outgoing user data. This anonymous routing is enforced from both the client and the server side, with each choosing a single hop from a network within tens-of-thousands of nodes (no one can track what exit node a user is on). Both the client and the server are only addressable by self-authenticating, end-to-end encrypted tunnels, and never by public IP address. This allows for communications that are unclassifiable to deep packet inspection without leaving any record of account information that could be linked to the end-user. (Read more)

Resistant to traffic analysis and to blocking.

Before leaving your computer, traffic over the VPN is encrypted and obfuscated via the I2P network, and a random hop is chosen from among the I2P nodes, whether or not they are running a libanonvpn application. That node is random and it will relay your traffic to it’s final destination, and I2P has a high amount of address churn among nodes. These properties make it much more difficult to block. (Read more)

Does it rely on TCP?

No, it uses I2P Datagrams which have both TCP and UDP based underlying transports, NTCP2 and SSU, it can tunnel any kind of traffic. Think of it like Onioncat or Garlicat, but with improved configurability, usability, and the ability to use it as an import in other Go applications.

VPN, without the Trust

Trusting a single entity with the ability to de-anonymize your connection is dangerous. With libanonvpn, a framework exists to obfuscate metadata about your connection from a VPN provider. Default a single “middle hop” is chosen by both the server and the client in the default mode, giving them a place to rendezvous without needing to reveal their IP addresses to each other while also minimizing the additional latency incurred by hopping.

Thank for Reading & Stay In Touch

We have a few methods of keeping informed about RTrades and Temporal’s latest developments, and access community support:

IPFS Temporal Twitter, Website & Telegram

RTrade Twitter & Website