Why CONET privacy network completely solved the problem of privacy communication

CoNET_Network
3 min readSep 26, 2023

--

CONET builds a new underlying infrastructure of the network

The Internet has become an essential life line for people today. But ubiquitous surveillance, communication filter and big data collection are increasingly becoming concerns for users.

Although there are privacy enhancement tools such as VPN, Tor, and decentralized VPN, the progress of privacy technology is far less than that of monitoring methods.

Users no longer trust the hypocritical promises of service providers. They need to solve the problem completely technically (code level).

Let’s review the TCP/IP protocol that forms the basis of the Internet.

The three elements of communication (source, destination, data) are transparent and open at the TCP/IP layer.

The solution to privacy at the TCP/IP layer such as VPN and Tor is to encrypt the data itself and use proxy destination to prevent the monitor from obtaining the destination that the user actually accesses.

However, there is a threat of user privacy being leaked to VPNs. Tor solves VPN problems by allowing multiple parties that are unrelated to each other. But Tor can be de-anonymized if the relevant parties collude.

NYM solves Tor problems through blockchain economic incentives and random on demand MIX technology to protect destination.

But the header (source, destination, data) required for TCP protocol communication still exist. This provides a convenient door to de-anonymization.

Secondly, these privacy tools have their own protocol and communication fingerprint characteristics, which makes it convenient for monitoring and blocking the private communication.

Let’s take a look at how CONET solves privacy communications.

CONET privacy communication is built on the application layer that is top of TCP/IP protocol, so CONET no longer has its own unique protocol. To block CONET, monitoring needs to block all the same communications.

Let’s look at CONET’s data packets. The CONET data packet is an encrypted text without any metadata.

So how does node forward the encrypted text to the destination?

The node that obtains the ciphertext obtains the public key for encrypted it through asymmetric encryption side channel leakage without decrypt. node will forward the ciphertext to the destination (public key — wallet address).

The source can only obtain it after the destination decrypts it with private key. The sender is completely hidden within CONET.

CONET is simple and efficient, it does not require layers of encryption and decryption like Russian matryoshka dolls, which reduces communication efficiency, and it does not require mix technology that can cheat and can be de-anonymized.

--

--

CoNET_Network
CoNET_Network

Written by CoNET_Network

Build a truly permissionless decentralized Web3 infrastructure

Responses (1)