• KiranWells
      link
      fedilink
      31 year ago

      I think Lokinet and Veilid are two different solutions to the same problem. Lokinet is intentionally based on the block chain to prevent attacks, while Veilid is intentionally non-blockchain based. Additionally, Lokinet seems to be more similar to Tor in its makeup and purpose, but I can’t find any information on how the encryption functions to compare to Veilid’s.

      • @[email protected]
        link
        fedilink
        English
        1
        edit-2
        1 year ago

        AFAICT they’re both multi-protocol (or even protocol-agnostic) onion routers. Tor on the other hand can only transport TCP.
        And while Lokinet has a stronger focus on exit nodes, I doubt there’s no way to host exit nodes on Veilid either.

        So from what I can tell they look to be very very similiar. Maybe they differentiate on which cryptographic primitives they use, but otherwise the same concept (except for the node hosting incentive approach).

        Maybe I’m entirely mistaken though. It’s hard to find technical data about Veilid.

        • KiranWells
          link
          fedilink
          21 year ago

          Regarding exit nodes, I have heard that Veilid does not distinguish normal nodes from exit nodes, meaning any node can be an exit node. However, I did not see this in their presentation, and the system seems to be more focused on peer-to-peer communication within the network than private accessing of outside web sources.

        • KiranWells
          link
          fedilink
          -11 year ago

          Regarding exit nodes, I have heard that Veilid does not distinguish normal nodes from exit nodes, meaning any node can be an exit node. However, I did not see this in their presentation, and the system seems to be more focused on peer-to-peer communication within the network than private accessing of outside web sources.

  • @[email protected]
    link
    fedilink
    31 year ago

    I feel really dumb but I can’t find any documentation on his to use it other than instructions on how to install a node

    • @mholiv
      link
      41 year ago

      I haven’t done anything but skim over the slides but if I had to guess I imagine it might be like using bit torrent behind CGNAT on IPv4. (a.k.a. You can use it but you can’t really contribute anything back to the community.)

      I would bet that it would work fine with IPv6 on T-mobile. :)