246 sats \ 2 replies \ @l0k18 4 Jan 2023 \ on: What are you working on this week? bitcoin
I just finished the cryptosystem for Indranet.
I now have working and tested algorithms that construct a message to be relayed from an exit node and it receives a series of ciphers and nonces that allow it to encrypt the message for the reply, but don't enable the exit to inspect the routing path information in the header, as they use same nonce, same public key but a different private key to generate the cipher in the header, versus the payload message.
I'm about to embark on a big refactor spree to tighten up everything and maybe restructure some things to be less kludgey and hopefully soon my protocol code will start connecting with the server parts that the super shadowy sponsor guy has started working on.
Seem to be pretty much on track to have a testnet live sometime in February.
https://github.com/Indra-Labs/indra
I have no idea what I just read, but I'm excited nevertheless.
More power to you!
Good luck in your endeavors. Make sure to consider every option at every node.
reply
I should try to keep it simple.
Indranet is the privacy layer for the peer to peer internet, that uses Lightning Network payments to compensate relay operators and as a spam limiter.
It's for stopping the use of network traffic routing data as a means to physically locate the origins of new messages.
-
It protects Bitcoin and Lightning Network users by hiding the location of the secret keys and creating opaque blocks against identifying the path of a LN payment.
-
It prevents criminal and authoritarian (ah but I repeat myself) organisations from physically locating journalists and activists who have found and are propagating evidence of wrongdoing.
It is not designed to replace Tor in that you won't use this to browse the regular Web.
It is intended to be used primarily with decentralised protocols like Bittorrent, IPFS, Nostr, and so on. It will also be possible to use it to access your own servers without revealing where you are connecting from, or even to create your own handy custom VPN path in or out of a hostile network
I like to say that this is the natural next evolution of internet routing: in the last 20 years we finally got full strength encryption to become normalised, in the next 20 years full strength anonymity is going to become normalised.
The internet is a hostile place. The less ways we leave traces the more we are protected from bad actors.
reply