Technical Architecture

Network Topology

  • Entry Nodes: Handle initial VPN connections and encrypt user traffic.

  • Middle Nodes: Relay encrypted traffic through multiple, randomized hops.

  • Exit Nodes: Decrypt the final layer and provide access to the open internet.

Example Path:

User → [Entry Node] → [Middle Node 1] → [Middle Node 2] → [Exit Node] → Internet

Security Protocols

  • Encryption Stack:

    • Layer 1: WireGuard® (ChaCha20-Poly1305)

    • Layer 2: Onion routing with per-hop key rotation

    • Layer 3: DNS leak protection via encrypted DNS

  • Node Authentication:

    • ZK-SNARKs for privacy-preserving compliance verification

    • Reputation scores based on uptime, latency, and security audits

  • Decentralized Governance

    • Proposals: Submitted via smart contracts

    • Voting: Token holders vote based on stake weight

    • Execution: Automated by smart contracts

Last updated