Technical Architecture
Network Topology
Entry Nodes: Handle initial VPN connections and encrypt user traffic.
Middle Nodes: Relay encrypted traffic through multiple, randomized hops.
Exit Nodes: Decrypt the final layer and provide access to the open internet.
Example Path:
User → [Entry Node] → [Middle Node 1] → [Middle Node 2] → [Exit Node] → Internet
Security Protocols
Encryption Stack:
Layer 1: WireGuard® (ChaCha20-Poly1305)
Layer 2: Onion routing with per-hop key rotation
Layer 3: DNS leak protection via encrypted DNS
Node Authentication:
ZK-SNARKs for privacy-preserving compliance verification
Reputation scores based on uptime, latency, and security audits
Decentralized Governance
Proposals: Submitted via smart contracts
Voting: Token holders vote based on stake weight
Execution: Automated by smart contracts
Last updated