logoalt Hacker News

Imustaskforhelpyesterday at 10:20 PM2 repliesview on HN

> Or residential proxies get so widespread that almost every house has a proxy in, and it becomes the new way the internet works - "for privacy, your data has been routed through someone else's connection at random".

Is this a re-invention of tor, maybe I2P?


Replies

chiitoday at 8:16 AM

> Is this a re-invention of tor

in a way, yes - the weakness of tor is realistically the lack of widespreadness. Tor traffic is identifiable and blockable due to the relatively rare number of exit nodes (which also makes it dangerous to run exit nodes, as you become "liable").

Engraining the ideas of tor into regular users' internet usage is what would prevent the internet from being controlled and blockable by any actor (except perhaps draconian gov't over reach, which while can happen, is harder in the west).

rolphyesterday at 11:53 PM

IP8 address tumbler? to wit, playing the shell game, to obstruct direct attribution.