Posted on

Developing Better Online Privacy

Part 2 

Internet Security – Online Privacy – one begets the other…

P2P

Peer to Peer is a censorship resistant means of connecting you to your counterpart, which exactly you need when communicating or transacting privately. This is a protocol that provides direct connections between end users, without any middle-man provider, that could observe your activities and potentially censor.

DVPN

A distributed VPN (dVPN) is a VPN (Virtual Private Network) on steroids, masking which websites you visit and what you do on them, or communicate there. Bare in mind this is your end and may not the case with your counterpart at the other end, which is often the weakest link.

Blockchain

P2P and dVPN make use of various blockchain ($Crypto) platforms, because blockchain produce an immutable ledger. Meaning, when a transaction is recorded to a blockchain, it can not be reversed or changed in any way. Thereby making a permanent, traceable record, on the blockchain.

TOR

The Onion Router as its often referred to as, is an essential a VPN and some, that in simplest use case, hides the websites you visit. TOR is accessible in various ways, from the simple to use Tor Browser which is a modified Firefox browser, tweaked to send requests over the Onion routing, which is a protocol based on multi-layered encryption, to hide TCP traffic. Or you can use Orbot on an Android & iOS devices to individually control traffic sent over TOR and/or allow various apps to bypass TOR and access the internet directly.

The TOR weakness being the Exit Nodes which can be and are set up by state spying & corporate tracking agencies.

SEARCH

Presearch.com is a P2P Search engine, that pays users in $PRE Crypto tokens for using. You can think of it as opposite to Google, where you must pay for enhanced listing in the search index.

Leave a Reply

Your email address will not be published. Required fields are marked *