Goal

Decentralized vpn.

Incentive

PRIVACY IS NOT A CURRENCY



When you sign into a website, they track everything you do and assign it to your registered account. Even when you are not logged in, they can still track you from your IP. It is easy to correlate user profiles to IP addresses because our behaviour is predictable and habitual. A VPN is a utility that masks your IP by having a remote computer securely relay your network traffic on your behalf.



IOTA VPN will reduce the cost and increase the speed compared to current VPN services. It will do this without jeopardizing your privacy and you do not have to trust a centralized corporation to protect your privacy. Currently, VPNs are trusted corporations that we pay for the utility of using their computers as consulates on the internet.

By decentralizing this service, anyone can setup a IOTA VPN node and start selling their bandwidth. From the client's perspective, you will be able to find a VPN closer to you than any commercial service can provide. It may be even possible to connect to multiple VPNs at a time, relieving yourself from relying on the bandwidth of the proxy computer.



Abstract

Using iota flash channels, we can transfer application layer data. We can pay per byte for a user to transfer data through the iota network. The main goal is the anonymously interact web pages by using the IOTA network to pay a user for acting as a proxy and to convey the data to the consumer.

Things to consider

Can we create a VPN like feature transferring packets, or focus on RESTful requests and other normal website traffic data.

Using asymmetric encryption in https for handshakes (as usual), the exit/gateway nodes does never have access to the encrypted data stream so there is very little to no trust in having an anonymous user handle https data.

Do flash channels cause a bottleneck for transmitting data?

Can we use multiple gateways at one time?

Can we use oracles to execute the request to the internet?

If so, we can have multiple oracles act as the network proxies, each one validating each other's results to be make sure they are all being honest. For example, say there are 10 oracles, and 11 network requests. Send each oracle a unique network request to execute; a total of 10 requests have been made, 1 per oracle. To validate the honesty of the oracles, we send the last network request to all oracles. Any outliers are making dishonest requests and will be dropped ar a network proxy.



A more in-depth road map and summary will be coming soon™