Oh wow, from the sounds of it they basically made Lokinet and the Session messenger running on it obsolete.
Thoughts?
I think Lokinet and Veilid are two different solutions to the same problem. Lokinet is intentionally based on the block chain to prevent attacks, while Veilid is intentionally non-blockchain based. Additionally, Lokinet seems to be more similar to Tor in its makeup and purpose, but I can’t find any information on how the encryption functions to compare to Veilid’s.
AFAICT they’re both multi-protocol (or even protocol-agnostic) onion routers. Tor on the other hand can only transport TCP.
And while Lokinet has a stronger focus on exit nodes, I doubt there’s no way to host exit nodes on Veilid either.So from what I can tell they look to be very very similiar. Maybe they differentiate on which cryptographic primitives they use, but otherwise the same concept (except for the node hosting incentive approach).
Maybe I’m entirely mistaken though. It’s hard to find technical data about Veilid.
Regarding exit nodes, I have heard that Veilid does not distinguish normal nodes from exit nodes, meaning any node can be an exit node. However, I did not see this in their presentation, and the system seems to be more focused on peer-to-peer communication within the network than private accessing of outside web sources.
Regarding exit nodes, I have heard that Veilid does not distinguish normal nodes from exit nodes, meaning any node can be an exit node. However, I did not see this in their presentation, and the system seems to be more focused on peer-to-peer communication within the network than private accessing of outside web sources.
I feel really dumb but I can’t find any documentation on his to use it other than instructions on how to install a node
deleted by creator
I haven’t done anything but skim over the slides but if I had to guess I imagine it might be like using bit torrent behind CGNAT on IPv4. (a.k.a. You can use it but you can’t really contribute anything back to the community.)
I would bet that it would work fine with IPv6 on T-mobile. :)
deleted by creator
Holepunching is trivial for IPv6.
I was trying to find the defcon video is it out yet or ?