Hacker News new | past | comments | ask | show | jobs | submit login
VPN⁰: A Privacy-Preserving Distributed VPN (brave.com)
348 points by jlborxes 10 days ago | hide | past | web | favorite | 130 comments





Great idea. Was thinking of doing something like this for a while, but obviously the drawback is that you're suspect to being the exit node for someone who's doing something illegal, which is a risk I'm not willing to take for the sake of privacy.

Obviously you can start a whitelist, but as some other comment said, it's pretty limited... and I don't want the hassle to add in every domain I go to (given the number of different blogs posts from different domains that show up on HN).

For now, I'll be sticking to AlgoVPN because I can't imagine how they'll protect the safety of users too (maybe a blacklist... although that'd be hard to given the numerous "bad" websites out there that make you suspect of further surveillance).


But would you be more OK sharing your AlgoVPN exit? With the same sort of blacklist/whitelisr approach?

Probably. Given that AWS/GCP can't trace back to me then maybe. But at the same time I'm afraid government surveillance is government surveillance and petty tactics around hiding your identity to AWS/GCP won't cut it.

How do you know that AWS/GCP can't trace it back to you?

They probably can as I've (hopefully) implied in my comment. When I sign up for AWS/GCP for a bit more credits for free, I use a burner phone (if necessary), burner emails (catchall emails), and a debit card (although GCP and AWS can detect if you're using one made by privacy.com or DoNotPay... so I have to call my bank and get one every now and then).

Given this relatively bad information, it's somewhat hard to trace. But as I've said: Government surveillance is government surveillance. These petty tactics to get around AWS/GCP won't cut it. Pretty sure they'll call up my bank using the card details and get my info real fast.


Do you still give them your real name and billing address?

My AWS billing address was a largely abandoned factory, not far from Veliky Novgorod.

Me too, think.

What about sharing it as an internal non-exit VPN in a nested chain?


Can you elaborate? Not sure what an internal non-exit VPN nested chain is... although I some vague idea on what that may constitute to be.

In this diagram, VPN1 is what I'm calling the "internal non-exit VPN": https://keybase.pub/mirimir/VBox-Two-VPNs.png

It's not as much "non-exit" as Tor middle relays. Because it just connects to the VPN2 server using OpenVPN over standard TCP/IP. Instead of some proprietary protocol. But at least it's locked down with pf rules, so that it can only connect to the VPN2 server.

The diagram shows a nested chain with just two VPNs. But you can add more layers. As I recall, as many as six or so. Latency goes up, and MTU goes down. But throughput doesn't crash as much as you might think. I don't know why. But maybe it's caching.

So basically, you have a NAT chain locally in VirtualBox or whatever. And each NAT router includes a remote VPN server.

In order to share it, you'd need to open a port for incoming OpenVPN connections. Either locally, or forwarded to one or more VPN servers. And then you could route traffic through another VPN server in the chain.


I refuse to use a browser with a cryptocurrency attached to it.

It feels like the only reason it is being pushed so hard is so BAT holders can make a buck. It might be a great browser but I will always think of it as onecoin with a some chrome tossed in.


Hello, John! I'm Sampson, a developer on the browser. The BAT component is not on-by-default in Brave. By default, you get a browser that blocks third-party trackers (and the ads that rely on them), prevents fingerprinting, crypto-jacking, auto-play media, and more.

Unfortunately, the ad-system that has become infested with malicious tracking and more is also a means by which creators across the Web find support. This is why Brave introduced the Brave Rewards component. So that we can create not only a safer Web, but a sustainable Web.

Opting-in to Brave Rewards means you're able to earn tokens for your attention. By default, these tokens are then donated to the sites and properties you visit throughout the month. The more you visit a property, the higher their end-of-month contribution will be.

All of this works without violating your privacy, thanks to on-device matching of ads and machine-learning. The token integration is a minimal component, but with a massive impact on the long-term sustainability of the Web. I'm happy to answer any other questions you may have.

All the best!


Given that IP address, user agent, fonts, screen dimensions, and a few other data points easily found via JavaScript can create a fingerprint [0], isn't a bit disingenuous to suggest any browser can truly block tracking, especially if JavaScript is enabled?

I could use cURL to perform all web browsing, but my IP Address + User Agent could still be tracked by the website I visit.

With time, what seems to be occurring is a game of cat-and-mouse where trackers develop more powerful heuristics for creating fingerprints.

[0]: https://amiunique.org/


To extend your comment; Even your mouse movements can be used to form an identity of you. Not only that, your mouse movements even correlate to demographic information about you (eg age/gender/etc).

With that said, I think you're correct in that it'll be a game of cat and mouse, but I'm not sure what the alternative is. Are you implying that there is anything that can be done beyond the traditional cat and mouse? Because I feel that's the same with security, crypto, etc etc.


Browsers need to rethink what is available via JavaScript. Scroll position, cursor location, etc. should not be readable. CSS Media queries for building responsive should still be fine to write, but the JavaScript API should be silent as to what styles are actually applied (to prevent workarounds for say, inferring the screen height/width from media query styles).

If we go back to basics, where I can make a network request, and the body includes a useful response (e.g., no need for running JS to populate the DOM, as is the case with SPAs that aren't server-side rendered), we can free ourselves from those more advanced heuristics.

It will likely always be cat-and-mouse, but we can rethink the universe of data available within the browser (that can be reported back via XHR requests), and make that universe much smaller.


Exactly. I am a big hater of everything that even remotely feels like a shitcoin. BAT is a silly useless project; I would not hate it if there was no conflict of interests, even if it's a silly project; but there is a huge conflict of interest - the developers want to make money out of thin air by issuing their tokens.

I already wrote this before in another comment. Basic Attention Token is not a secure cryptographic system. The idea to pay tokens for shown ads cannot be cryptographically secure. There is no known way to have a cryptographically strong "Proof-of-Watch". All that browser does is, when a user watches an ad, it communicates to its backend and asks the backend to send a token to an address attached to the user. It's not a cryptographic system that mines coins by showing ads.

It's a useless gimmick that has nothing to do with cryptocurrency. The real coins are so valuable because they are cryptographically strong. This thing is centralized and its mechanism of payments for ad views is not cryptographically strong. The token has some value only because of peoples' stupidity.


There seems to be some confusion here; users aren't paid for watching ads in Brave. When an ad notification has been delivered, the user is paid. There's a subtle difference there. Brave (because it is the browser) is able to determine when an ad has been displayed, better than any JavaScript-based client that exists today on the Web. Presently, ads are only shown as desktop notifications (no publisher ads at this time). When the notification is registered, your end-of-month payout increases.

Judging by your choice of words, I assume you're a proponent of using Bitcoin. We did this, originally. Unfortunately, Bitcoin was at that time experiencing serious issues with network congestion and large fees. Our users (who only with to buy $5 or $10 at a time) would often have to pay nearly as much in fees. That clearly isn't sustainable. Introducing BAT (on the Ethereum blockchain) meant we had a faster, more reliable system. It also meant the creation of the User Growth Pool, a reservoir of 300 million tokens that could be gifted to early users to raise this novel apparatus off the ground (and it has been working wonderfully at that).

If there are any questions I can answer for you, I'd be happy to chat further.


I applaud all of the privacy efforts by Brave so far. Can you say what the long term business plan is for Brave? At some point you have to monetize it to make it sustainable. Is this where the crypto coin mentioned here comes into play? If so will there be an alternative subscription-based model?

I'm not willing to really try to prove that BAT embedded in Brave is a fundamentally flawed project. Because there are so many project of this kind in the current blockchain industry that I dislike very much, that I don't have enough time and motivation to dispute every such project. People who see what kind of clownade current blockchain industry is, will see it on their own. Those who don't think so, I don't want to convince (I tried before a lot, but marketing of big "blockchain" projects overpowers any words of a couple of geeks).

1. The power of blockchain is in its cryptographic strength. Without cryptographic strength a blockchain is worthless. Strength of a system is defined by the weakest link. The weak link of Brave + BAT is in inability to mathematically prove an ad view. Neither there is a known way to cryptographically mine coins by viewing ads. This means, there are no cryptographically secure methods to pay for ads. What you made is a program that displays an ad and ask your server to send coins to the user. Of course, this can be spoofed. Hackers can reverse engineer how Brave communicates with your backend and spoof it. There is no cryptographic way to prove that an ad has been shown. Hackers can make the windows with ads invisible etc, and still receive reward. And I'm sure they are doing it, but as long as spoofing rates are within your business model, you don't mind because everyone is making money and you don't want to ruin the party.

2. I'm not a proponent of Bitcoin particularly. I dislike everyone who creates a new coin for a fake reason, for something that doesn't need a new coin and issues a trillion tokens. I am for progress, and I don't mind when a new really innovative coins appears with a separate blockchain, but I hate when a new coin is created just to issue a trillion of tokens, give it away for free, and in this way giving it perceivable value. It at least must be mined, and some resources (electricity and hardware) must be spent to back up its value; a trillion token issued out of nothing don't have value. I would not care if it was just a silly useless project, which GitHub is full of, but there is an irresistible temptation to create a heap of tokens, keep a little bit, give the rest away, apply some sleazy marketing and make people believe that there is some value behind the tokens. A decent project must avoid at all cost creation of a new token without a reason that absolutely requires a new token, and instead use an existing token that has value behind it (resources are being spent on creation of that heap of digital money).

I always liked blockchain, I will always like it. I use Monero much. But the current blockchain industry is full of projects that are fake blockchains, centralized blockchains and especially systems where a blockchain and a product cannot be cryptographically linked. Such as reselling electricity through blockchain, track fruits from a farm to a shop through blockchain etc. I only don't understand if people pretend that they don't see this because everyone has a share in the growing industry, or they are really so stupid that they don't see the fundamental problem.


Actually this is a missing piece that essentially allows content based micro transactions and allows cutting out ad salesmen. Win for everyone. But ad salesmen.

This seems like a nonsense argument. You prefer a browser that spies on you? Over a cryptocurrency you don’t have to use?

It’s not really one or the other. Firefox and Safari both exist and the incentives of the companies that run them are reasonably aligned with user privacy.

Our CEO co-founded Mozilla and Firefox. There is still a problem of invasive tracking and surveillance capitalism on the Web, and neither or these are hit as hard in Safari and Firefox as they are in a default install of Brave.

The BAT component is off-by-default in Brave. Only enabled when the user explicitly opts-in to the feature. This is a necessary component, as blocking-alone is not a solution to the sustainability problem. Blocking trackers and their ads means blocking revenue for the content creators and publishers we all know and love. Extra steps have to be made if we're going to continue to foster and grow the Web we have all come to love.

With Brave you enjoy a base-line experience of privacy and security out of the box. Opting into Brave Rewards means you can earn tokens for your attention, without giving up your data. Those tokens are automatically queued up for an end-of-month contributions to the sites and properties you visit most. Or, you can tip those properties in a one-off-manner (like I do every time I land on a Wikipedia page).

I hope this helps a bit. If there is anything further I can address, I'd be happy to chat. Thank you for your time and attention :)


I may not necessarily agree with BAT, but I do suggest Brave to anyone who is too flustered to use Firefox with uBlockOrigin and other extensions [0]. It really has a great UX.

As for long term sustainability of the web [1], Brave, imo, has a better idea on their hands than Google's proposed privacy-sandbox [2]. For the sake of competition and innovation, I hope there are many more such initiatives.

Best!

[0] https://news.ycombinator.com/item?id=20783339

[1] https://news.ycombinator.com/item?id=20809574

[2] https://news.ycombinator.com/item?id=20767891


your ceo? the same guy who was kicked out of mozilla?

Yes, the guy who was kicked out of mozilla so they could score political points. Not for technical ability, not for competence, but for politics.

The issue isn't aligning the incentives of browser vendors with users so much as aligning the incentives of content creators with users.

Two comments:

* BAT is a non-financial utility token, not a currency.

* The Brave Referral Program specifically prohibited participants from making statements that BAT is a currency, a store of value, or an investment.

Examples of real-world non-financial utility tokens are amusement-park ride tickets and beer-garden food-and-drink tickets.


If it's not a currency, what value does it have to the holder?

It should also be noted that the law determines what qualifies as a currency, not the issuer. If it looks like a duck, quacks like a duck - you know the rest.


Utility tokens are, like arcade game tokens or food and drink tickets at a fair, valuable for their use with a particular venue or service -- not for their exchange value. Generally, the law does not recognise these kinds of things as currency.

I'm reminded of Itchy and Scratchy Money, themselves a parody of Disney Dollars: https://www.youtube.com/watch?v=dErRj6V8_xQ

I'm not sure why Brave thinks the public will seriously value these.


Purpose specific tokens make sense when the scope is "limited enough". The public does actually use laundromat tokens, food tickets at fairs, arcade tokens and similar things. They wouldn't take them seriously outside of the appropriate context but they definitely take them seriously within them.

Sure, but the world isn't a Chuck-E-Cheese's restaurant. The real world deals in cash, not tokens to be exchanged for trinkets. It stretches the imagination to believe that website purveyors are going to want to deal in Brave Bucks, or whatever they want to call them. And if they can be exchanged for arbitrary goods and services, as opposed to a tightly constrained set of options, it's going to be deemed a currency.

What if the token were only redeemable on-network for advertisements and reading, and otherwise the only thing to do with it would be sell it on an exchange for currency?

We're going in circles here.

Here's the thing: the law looks to intent. If the sole purpose of issuing these things is to evade regulations by coming up with something that's not designated a currency but otherwise operates like one, no amount of jumping up and down and screaming "it's not a currency! don't call it a currency!" isn't going to make it something other than a currency. Courts aren't dumb and they don't look kindly to parties who try to game the system.

In your hypothetical, the existence of an option of selling this thing on an exchange for other currencies makes it very similar to any other kind of currency. I think you'd have to eliminate that option to avoid getting too close to the line. But if you don't have that option, I just don't see how it'll have any significant value to the recipient.


Most non-currency things can be sold for currency. What makes BAT more similar to a currency than those things?

I'm totally speculating here, since I'm not intimately familiar with the pertinent regulations, but I think it's not going to be about the token's inherent properties as much as the mechanisms surrounding it.

With a token such as a laundry/car-wash token, an amusement ticket, or a Disney Dollar, you can't get cash back from the issuer. Once you buy them, they're yours forever, unless you can find a third party to give you money for them. The fact that you can (try to) sell them on eBay to a willing recipient doesn't make them currencies.

So I think it comes down to who controls the exchange. If it's a third party with no connections whatsoever to the issuer, then it's unlikely to be considered a currency. But if the issuer is also operating the exchange, or has a connection to the operator, then I think it's going to look a lot more suspect in the eyes of the law.

Again, this isn't legal advice - consult a licensed attorney in your jurisdiction.


Amusement ride tickets have inherient utility: you can redeem them for a ride. What utility can you get from BAT, other than selling it?

Attaching a crypt coin to it only makes sense if it's more fully decentralized. The fact that it is centralized is why it's confusing. We run the VPN and they get the money.

In something like Lokinet, the whole thing is distributed and the people that run the service nodes get rewarded with coins. But normal end users don't have to think about the coin at all.


Who cares? You don't have to use the crypto part of it at all.

Idk – with something as crucial as a browser I want the people who give it to me to have a clear and obvious incentive structure.

With other browsers, the clear and obvious incentive is "to get paid to spy on users". I'm not a big Brave fan but saying their incentives are worse than Chrome or even Firefox is ridiculous.

Have you ever heard of open source browsers like ungoogled chromium or pale moon? They have no incentives and are far better than brave’s, who wants to sell you advertising.

> who wants to sell you advertising.

Inaccurate. Brave wants to overhaul advertising: to be able to switch it off completely paying a fee, or earn money by not switching it off (and thus watching the ads), tune it, etc


This is why I happily set Brave Ads to show me the maximum amount of ads per hour. Brave is serving ads in a privacy-conscious implantation which uses local machine intelligence to determine interests. There's no broker trying to sell your data to advertisers and yet personalized ads can still be served. Also, Brave Ads show up as a notification. Much more aesthetically pleasing than those whole-page ads that some websites have unfortunately adopted.

I agree that their system avoids a lot of the ethical problems that would come from leaking all the user data to ad networks.

Having said that-- ads are an unethical distracting nuisance. From the evidence of every use case outside of esoteric journals they will increase their aggression even to the point of threatening to destroy the value in the medium to which they are attached. Try listening to a Youtube version of "Tristan und Isolde" that has ads turned on. It becomes a broken video file at that point.

Worse-- web site owners have already shown that they lack the expertise needed to asses the ethics of the ad delivery systems they use. I can't tell you how many otherwise ethical open source devs used to have a fake download button from ad malware right above the real download button for their software. Never mind that the previous incarnation of Sourceforge just decided to turn evil one day and bundle malware. I don't think Github would do the same thing today, but most open source devs have no plan of what to do if they did. So we're not any better off today in terms of awareness of these problems.

Plus, adding cryptocurrency tokens to that same confusion in no way makes it easier for those same devs to suss out the ethics.

Edit: just to be clear-- the fake download button came from the ad network domain. The site owners almost certainly just leveraged ads to pay the bills under the logic, "How bad could it possibly be for the UX?" They'll ask the same question of Brave's system, or any system, and have the same lack of expertise with which to understand the given answer.


Of course. Chromium is still an upstream that has had changes due to Google's interests, right?

Brave is fully open source. [1]

Brave's model is to try to remove the coercion from advertising. Right now most companies are spending immense amounts of efforts spying on your and then trying to shove ads at you, and fighting every effort to block those ads or to avoid their spying. Brave's model is instead to try to create a more cooperative system. You view ads if and only if you want. The motivations they give you for this is to support the sites you like while also getting a little kickback yourself.

Somewhat analogous business models have failed, repeatedly, in things such as 'socialism restaurants' that tried to operate on a pay-what-you-can scheme since enough people opted out (by paying $0) to make it a losing venture. But I think it's something that will likely succeed here since the purchase price is always $0 - you're paying with attention, not money. Hahah, perhaps one of these socialism restaurants could actually work if they also provided a "free" pay method such as watching an ad!

[1] - https://github.com/brave/


If only it were possible to have no incentives.

Okay, not no incentives, but incentives that match up with our own. I doubt the maintainers of ungoogled chromium have a secret agenda to take over the browser market. Their incentive is that they dislike google and they want a good browser without google spying on them.

> or even Firefox

Please expand.


Where does most of the Mozilla Corporation's money come from?

I'm not trying to cast stones here, but they're still primarily (last time I checked) funded by Google- not users. Your incentives are aligned with the people who pay you.


Brave Software has a clear and obvious incentive structure. Here is the business model:

1. Build and maintain a browser which creates a local profile of its user, a profile which never leaves the user's machine.

2. Sell ads which can be targeted to users with certain characteristics. Distribute the entire catalog to every user's machine. The browser selects a suitable ad from the catalog and displays it to willing users.

3. Profit.


I'm not a big fan of BAT, but how much clearer can the incentive structure be? Offering a browser completely for free is actually much more questionable. User becomes the product, but it's never stated anywhere. With BAT it's pretty clear who are the interested parties and why.

You still didn't explain how a feature that you'd never use affects you in any negative way.

Every browser has features that you don't use.


Until that update flips that flag and the opt-in becomes the default. Do you trust Facebook to honor your privacy settings?

What does Facebook have to do with any of that?

Facebook can't change the privacy rules or the settings of your browser.


I consider both companies untrustworthy. I was using a example of a thing nearly everyone shouldn't trust. I could have used Google, Apple, USPS as examples too.

It's opt-in, and the feature can even be completely hidden in the settings. Brave is an awesome browser. Certainly better than Chrome when it comes to privacy.

Better than Chrome is such a low bar though. Chromium is better than Chrome, Kiwi is better than Chrome, Edge is better than Chrome.

Is it a low bar? Chrome has the best JS and rendering engine in existence. Brave has all that, being a fork, and also the best privacy, except maybe the Duck browser. It's only missing the configurability and extensibility of Firefox, but that's arguably a privacy liability.

I believe the post was referencing the OP's statement that "Certainly better than Chrome when it comes to privacy.", not any kind of purely technical merits.

> I refuse to use a browser with a cryptocurrency attached to it.

The optional rewards program that happens to use a distributed ledger for settlement?

Lets see how that sounds when it is rephrased

“I refuse to use an airline with a rewards program attached to it”

“I refuse to use a credit card with a rewards program attached to it”

But since nobody says that, you lose your mind when a blockchain based one is used? Which is also as entirely optional as the above programs? Which you use as an ad hominem attack to add non-sequiturs to any contribution under the “Brave” brand such as this ZK VPN system which doesn't even use the digital currency? Fascinating, lets revisit this “taboo” next year to see!


“I refuse to use an airline with a digital currency attached to it”

“I refuse to use a credit card with a digital currency attached to it”

But since nobody says that, you lose your mind when a blockchain based one is used? Which is also as entirely optional as the above programs? Which you use as an ad hominem attack to add non-sequiturs to any contribution under the “Brave” brand such as this ZK VPN system which doesn't even use the digital currency? Fascinating, lets revisit this “taboo” next year to see if it is one at all!


GP didn't say digital currency but cryptocurrency.

what difference does an optional rewards program make when its on a blockchain and also has nothing to do with the article?

The whitelist based approach seems pretty limiting, doesn't it? If every exit node is expected to enumerate the domains it will carry traffic to, what happens if a client needs to connect to a new site? Are exit nodes intended to keep massive, curated whitelists?

Something isn't adding up, to me. If the assumption is that all "good" sites _can_ be enumerated, then wouldn't Tor (or other systems) exit nodes already be capable of blocking CP?

Someone connect the dots for me....


The CP, Drug markets etc on Tor is typically on hidden services, not on the clearweb.

The whitelist approach may work similarly to adblocker lists, where you say "I trust Jim's List Of Friendly Websites". I don't know how good it is for performance though.


Obviously you can do a block for *.onion. But suppose someone searches up "how to make a [insert bad thing]" or something else inappropriate on something as simple as Google. It'd be somewhat hard to block all urls from Google or DDG that contain some text (not to mention that I've heard that people who are in this business use acronyms or other slang... which to the general user (like me) probably won't know.

Don't want to take that risk.


I believe the blocking is done on a domain/host level, so you'd block google.com in that case. That's likely not required, because google.com is generally thought to be okay, but you are correct that even that may be problematic. If your IP has searched for "$governmentBuilding blueprints" and there's a bomb planted at that building a week later, you could become a person of interest (provided that Google saves the ip for queries).

Blocking *.onion on the other hand wouldn't be necessary from a "legal protection" standpoint: hidden services don't see the original IP of the client.


Google knows IPs are shared and track on L7, they know Tor, NAT, CGNAT. So I'd wager if you share access to Google via Tor you'd get issues with Google quite quickly if not logged in and easily L7 traceable, in form of captchas and blocks everywhere.

TOR exit nodes can modify some data to clearnet sites, including blocking

They can't do this to onion services


One step further that Ive prototyped is Encrypted and Distributed Search. The VPN relays willing to take the traffic can also double as Web crawlers. The vpn clients encrypt their search terms and vpn relays encrypt their search indexes, and perform ElGamal Homomorphic private set intersection with MINHASH in Elliptic Curve Field. This leads to better then key word, worse then current age context search from google but with Strong Elliptic Curve privacy guarantees.

To make this type of search higher precision&recall you would have to focus especially on the indexing part (e.g. improve NLU of concepts in the pages), right? The training of such ML models could be federated across the nodes in a private way.

Indexing is important for sure. The problem is to preserve privacy and not falling back to heavy weight general purpose Multi-party computation we have to give up a bit on the precision and recall of modern search engines. Minhash, more specifically Locality Sensitive Hashing (LSH) is a good first approximation (Better then Term Freqency, worse them ML based search). Right now much of the web is unqueryable, my first goal was to allow the deep web and TOR services to be searched even at just a rudimentary level.

Using zero-knowledge proofs to get around the "I don't want to carry <content-I-dont-like>" barrier to entry of distributed relay tech, is really very clever. The performance sounds like it might suck though.

Why not Tor? Providing more bandwidth to that network seems the most advantageous option. You also get stronger privacy guarantees.

They explain that in the first paragraph or so.

This allows edit nodes to decide what types of content will be routed to their node.


And opens the network to abuses Tor was meant to protect against. If proof-of-destination is built into the network then that is a huge step towards invalidating the main benefit of using a VPN -- you don't want someone (your local authority) knowing where you've been. Current VPNs sort-of work by not being in your local jurisdiction. Decentralizing it makes it easier to attack.

It uses zero knowledge proofs, so it doesn't really give anyone on the way proof-of-destination.

You have proof that someone visited a specific site because it uses a value derived from that site's SSL cert. You just don't have any more knowledge than that.

No.. You wouldn't need a ZKP for that.

From the paper:

> Note that such a proof is not straightforward. We firstly prove that a ciphertext, CS N I , is the result of an encryption without disclosing the public key nor the plaintext. This causes the highest overhead in our construction. We use the construction presented in [7] for this purpose.

> Then we need to link the public key encrypted in clause two, with the one used in clause one. For this we use a proof that two commitments hide the same secret [5].

> Finally the third clause can be openly computed by A given that it received the public key from R.

> Using this, S can convince A that the tunnel created is to a domain that the latter considers valid, without disclosing which one.


Tor can also have whitelist for clearnet domains.

Tor doesn't use BAT.

Tor is funded by the US government, probably as a way of disseminating US propaganda during government overthrows. When conducting psyops, governments sometimes block the online channels the US uses. With them also controlling so many nodes, they can use Tor for surveillance.

Tor is funded by the us government. Why is very unclear. They may have backdoored it. They may be using it for surveillance. They are probably not using it to disseminate propaganda (they can do that over traditional channels). However, the likeliest reason (imo) for funding tor is simply that they need it themselves. There's a famous--and possibly apocryphal--anecdote from a security researcher who met an FBI agent at defcon. The security researcher brought up tor, and the FBI agent said 'oh, yeah, we have our own anonymity network like that--except it's just for the FBI'. The security researcher was unable to explain to the FBI agent why that made no sense.

It was revealed the FBI poses as Russians when doing their digital operations; maybe that's what they meant.

Tor absolutely spreads US propaganda. The "clear net" does too. The utility of Tor is that it prevents that clear net propaganda from being firewalled.

In the case of Hong Kong, we know who funds the terrorists. They meet with them in person and have been photographed, and the US makes no secret of how much they spend on terrorism in Hong Kong. But I still wonder how guides and instructions are given to the right people. Having read many CIA documents written to terrorist groups, I do wonder how they send these to HK terror leaders in the digital age. Tor is a candidate. Number stations, I kinda doubt.


>we noted that existing dVPN designs fail to provide strong privacy guarantees...their decentralized nature requires strong guarantees on the traffic a dVPN node carries without violating a user's privacy, at any time.

I suggest looking into the Loki project https://loki.network/

I'm not completely sure how these two efforts compare, but Lokinet is essentially a more privacy protecting version of Tor.


Is there an open source version or something of this? I had similar ideas and this is something I would have liked to contribute to.

I was thinking of approaching the white listing problem by whitelisting users, I. E. I share my node with friends I trust, and that gets propagated through the network depending on trust levels.


Isn't Brave open source?

This is the sort of feature that could get me using Brave instead of Firefox. Great job by those guys, I've been wanting something like this for a while now!

Same here, now I'm interested in brave. I wonder what kind of cool thing they'll come out with next.

This is not a new idea. Hola has been around for years.

Trying to protect users through access control is foolish. It's like running a Tor exit from home.


I guess it's a bit different for two reasons:

1) Here users are using the bandwidth and it's not resold to companies like Hola does is with https://luminati.io. At least for now.

2) They whitelist domains, so they could only whitelist example.com and you know it's not like Tor where everything goes or Hola where someone is web scraping things through your IP.


True, nothing like Luminati, I gather.

But the very idea of sharing my uplink is anathema. Maybe if everyone curated their own whitelists. But once people rely on whitelists from "trusted" peers, all bets are off.

A safer alternative would have users sharing access to each others VPN service connections. That would at least insulate users somewhat from malicious/illegal traffic routed through them.

Indeed, I routinely route traffic through nested chains of 3-5 VPN services. A common criticism is the cost of multiple accounts. And I typically have even more accounts at any given time, for variety.

But if a bunch of people pooled access to their VPN services, or to VPNs that they ran privately on anonymously leased VPS, each one could have a much larger variety of VPN paths and exit IPs. And you could multiplex and split traffic through the VPN network, to increase anonymity. Or aggregate links, using MPTCP, to increase throughput. And you could even implement something like Tor's process of switching circuits every 10 minutes.

I bet that I could implement a simple version of that with routing tables and iptables rules. And some shell scripts. Perhaps with network namespaces, for a little more security. Even Docker, maybe.

But not just sharing ISP uplinks. That will end in tears.


> "They whitelist domains"

That's not a bad idea, actually. Who maintains those whitelists and how do they get updated? If you want to make the web somewhat usable for others, is it enough to whitelist "google.com"/"youtube.com" only (for example)?


Cant recommend not running a TOR exit node from home enough. When i was running mine for the ~6 months it was online, cox would shut my internet off for various reasons on a weekly basis.

My IP got blacklisted from various sites for simply running a non-exit relay. People say it's totally safe to run a relay/bridge; it is not.

Hosting a bridge from home is safe. They're not in the global relay list so nobody knows which IP to block. Middle relays should be safe to host from home but unfortunately some overzealous 3rd party lists of "evil IPs" include them.

Perhaps Tor should become an integral part of the TCP/IP stack. That way, exit nodes would simply be the destination nodes for every connection. (?)

I'm finding it difficult to understand what you're saying. You can already funnel all your traffic using a Tor SOCK proxy. So you don't need any changes to the TCP/IP stack to do what you seem to want. However, forwarding all your traffic increases the risk of fingerprinting, so you should give it careful consideration.

Let me clarify, because you are talking about something else. One of Tor's weaknesses is that you always need exit nodes, and running an exit node comes with certain risks. Now, what I'm saying is that if Tor was an integral part of the internet, then everybody would effectively be running exit nodes. The exit node and the destination node would be same thing. Government agencies wouldn't be able to take down exit nodes because that would mean they would have to take down the entire internet.

Maybe they used to. Tor Project does not recommend running even middle relays from home.

Which sites?

Not op, but it's my understanding that they can blacklist pretty much the same sites as for exit relays. So your email client may stop working, Also search sites, social media, etc.

Obviously, anyone can blacklist anyone for any reason on the Internet and relay nodes' IPs are public. But do they?

I run a relay node on my personal server and never had any issues. But 1) I rarely browse the Internet from that IP and 2) it's in OVH so if it were blacklisted, it could be because of that.


Banks, Amazon, etc. Ended up on a blacklist for serving a relay from my personal home IP.

EVERYTHING behind cloudflare will captcha you on every page load. Have a dynamic IP from your ISP, they'll know about the new one with 30 minutes.

Also, depending on the country, you can be hold responsible if someone use your exit node to do something illegal.

As far as I remember, in France, you can get the same status as an ISP (don't remember the name though) to be able to run an exit node without being held responsible. But you will have to respect certain rules.


(I am technically involved in a project called Orchid that would be considered a direct competitor to this idea, were this idea a product; but I would like to think my cynicism isn't related to that ;P.)

So, a more complete--and somewhat more balanced--description of this is in the actual paper, for which this is just a blog post summary; I would think the paper is way more valuable than this blog post, and maybe should even be the Hacker News post target.

https://arxiv.org/abs/1910.00159

First off, the DHT here is unlikely to scale well to large whitelists; yet, for small whitelists, you will (of course) end up knowing the target domain to high probability--which, even for large whitelists, is going to be possible given just the target IP address almost all of the time anyway: even with a CDN, the set of websites you get overlapped with tends to not be extremely large; and, even when it is, it is almost always with a bunch of niche websites that are unlikely to be on your whitelist--so, the premise that this is all hiding from the exit node who you are connecting to is extremely weak.

Oh: and when it does even sort of work with the CDN (due to having the shared endpoint), the user can usually then use domain fronting to trick the SNI, which would bypass this proof and let you connect to any other website behind that IP address; so, really, the way they are doing whitelists is just wrong: the IP address you are connecting to and the totality of what is behind it is way more important than the SNI. Essentially, while you can do this (prove, in zero knowledge, the SNI of an HTTPS connection), it doesn't seem like it really helps a real-world problem (as the situations where the technique works correlate with situations where you failed to hide anything).

Meanwhile, this paper admits to taking 10-30 seconds per HTTPS connection (not per VPN tunnel!) as the DHT lookups and zero knowledge proofs are both slow operations. Somehow, before that completes, it sounds like you just get to use a different node to send "unauthorized traffic"? Why can't I just sit in that regime forever? I am hoping I just don't understand this part, but they say it multiple times as if it isn't such a big deal, and have a bunch of space dedicated to trying to make it sound like the unauthorized traffic would be a small portion of the total traffic (which doesn't exactly sound comforting).

And finally, domain whitelists don't work in the first place: I can post horrible things that get you in trouble to the comments section of a news site (their best example of a kind of website you might whitelist) quite easily; and, for their example of Facebook, it is actively dangerous: Facebook is an entire Internet unto itself that proactively scans for evil things, and so if you whitelist that you are essentially admitting "I would be willing to let you do anything". I could see a URL-based whitelist potentially having value, but not a domain-based one. We shouldn't be making users feel safer with systems that don't even slightly help :(.

(It is maybe also worth reminding that before the advent of encrypted SNI, this data could easily have been used to filter and whitelist traffic... and yet people working on projects like Tor still don't use it for filtering, as it just isn't enough, as you still don't know what the user is doing. It frankly just feels likely to me that the two goals that people want to simultaneously achieve here--"I don't know exactly what you are doing" and "I do know, to some reasonably high certainty, that you aren't doing something that would harm me"--are simply philosophically incompatible without some form of reputation/trust... which then makes achieving a third goal that people want--"I don't know who you are"--much harder.)

Regardless, back to the paper itself, I would argue that this is a single maybe-novel idea--that you can do a zero knowledge proof over the SNI packet of a TLS 1.3 connection with encrypted SNI--that is, as is common in academic papers, trying to be described in the context of a full-scale solution by surrounding it with the minimally-viable wrapper required to turn it into a product for an under-specified use case and then trying to type quickly past the serious downsides (such as the latency), all without being extremely critical of whether the idea itself is useful.


This idea of a dVPN based on cryptocurrency is not new, see for example sentinel, mysterium or privatix.

How about sharing blacklists instead? Whitelisting sounds like a performance bottleneck

How do you say VPN⁰ out loud? Would be good to clarify that in the opening paragraph.

'one'

Why?

I came here to make this joke. Basically, any number taken to the zeroth power is 1.

Thanks for taking the time to explain!

VP

"VPN Zero" I'm sure.

Me, I'd just say zero.


I would assume “zero vpn” or “vpn zero”, as it most likely a reference to “zero knowledge”.

with a high voice for "zero"

1

I personally like "VPN Aught".

subscribing to shared lists like we do now with adblock but for exit capabilties would work very well. I think an auto meshing VPN system like Tinc or N2N would be better for the network too

Does it support OpenVPN?

How is it different from Cloudflares 1.1.1.1?

They have nothing in common. Cloudflare's 1.1.1.1 is a DNS resolver.

Cloudflare's Warp VPN service is provided under an app of that 1.1.1.1 name, which may be the confusion here.


It's like a half VPN, https://blog.cloudflare.com/announcing-warp-plus/ see "What WARP Is Not"



Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: