Hornet: High-Speed Protocol for a Fully-Encrypted & Anonymous Internet

Hornet: High-Speed Protocol for a Fully-Encrypted & Anonymous Internet

Have you ever imagined what it would be like if the Internet allowed you to use it in total security? If you are a person who loves things like freedom and liberty, or if you are a political activist looking to avoid persecution for expressing your beliefs, it might be more desirable than ever today. It seems the list of entities looking to spy on you, usually illegally, is growing on a daily basis. What if Internet spies were no longer a problem because the Internet itself were encrypted to protect user’s privacy? You’re not alone in wondering how to make that happen, and it may now come....


Related News

HORNET Combines User Privacy and High Speed Internet, Bitcoin Implications Possible

Maintaining privacy while using the Internet is not an easy feat to accomplish. Even though there are alternatives, such as using Tor, for example, there is no way of guaranteeing your information is private at all times. That being said, researchers have created HORNET, a better and faster implementation of what Tor has been trying to achieve for many years. Tor has been the frontrunner when it comes to [partially] anonymizing details from Internet users. As a result, Tor has managed to gain a lot of popularity over the years, especially in oppressed nations and has even become a powerful....

Davemail, Decentralized Encrypted Communication on Git

Davemail, encrypted, decentralized email protocol on git, a new way to overcome government surveillance! Anonymity and privacy are hard to come by in today’s version of the Internet. The governments and its cloak and dagger machinery have been keeping a constant watch on the usage of internet, even going through the communication between people. In such times, any form of communication that promises privacy, security and anonymity is most welcome. Davemail is one communication platform created by ‘David Apple’ which promises all of the above. Available on GitHub, Davemail is a....

5 Tools That May Replace Tor As Crackdown on Encryption Nears

Tor, the (in)famous encrypted web browser, may not be strong enough to resist the next generation’s attacks on encryption. What will the next generation of encryption tools look like? Tor came to the forefront of the privacy debate through providing an encrypted web browser used by such services as the Silk Road. In the years since Edward Snowden leaked the NSA’s mass collection of metadata, the amount of Internet users interested in encryption grew dramatically. However, Tor’s encryption may not be completely trusted. In fact, 80% of user types may be de-anonymized within six months,....

Dusk Network: Why it’s Testnet Launch is a Game-Changer

If there is anything the internet loves these days, it’s privacy. From the boom in VPN use to anonymous accounts and encrypted websites, maintaining privacy is certainly appealing to the average internet user. This interest in privacy has also coincided with the rise in blockchain technology, a concept that thrives on the idea of privacy. […]

Terabithia cross-chain protocol bridges Internet Computer and Ethereum

The bridge allows users to transact Ethereum native assets at faster speeds with lower cost and store them directly on-chain. On Wednesday, Psychedelic, a Web 3.0 development studio building solutions for the Internet Computer, launched Terabithia, a cross-chain contract communication and asset mirroring protocol. Beginning with the Internet Computer (ICP) and Ethereum (ETH), users will have the ability to mirror and use any ETH tokens, fungible and nonfungible, on the Internet Computer blockchain and vice versa, effectively turning ICP into a layer-two scaling solution for ETH.The....