@
[email protected] couldn't say. I don't have time to examine the project or test it. I think the combined endpoint routing is a strong idea the way their documentation explains it. Allowing users to choose longer circuits is also very good, and we used to have that in Tor a long time ago. Veilid can probably can be made quite a bit safer than Tor if an app network includes a good number of nodes.The keyed network option is a great idea. I can't overstate how important it is to be able to have private mixnets or mixnets run in cooperation by consortia yet segregated from public access. From the documentation it looks as if the users can slice and dice for their own recipes.One thing I think could be added is swarm routing for larger networks. Instead of sending data through a route or circuit, the data is chunked into equal-sized payloads and shuffled through a swarm of randomly-chosen routes in longer routes. This would be a nightmare for eavesdroppers, requiring much more in the way of compute power and honeypot peers for statistically correlating endpoint IP addresses.Another problem exists with mixnets and I don't see anyone discussing this problem. In a peer-to-peer mixnet anonymity is supposed to be achieved by tunneling through multiple peers. The theory is that each peer in a circuit can only know the adjacent peers, and thus not be able to correlate endpoint IP pairs. However a determined adversary with large resources can spin up and run dozens or hundreds or even thousands of peers on a public network. Thus any route formed through a series of these hostile peers would not achieve anonymity for either endpoint. Since the adversary owns all the peers in the route, the adversary can use the timestamps and payload hashes to correlate the route and identify both endpoint IP addresses. Yet ameliorating this attack on a public network requires a certain number of tamper-proof peers for which all users can verify those peers have not been tampered with. The private key network option of Veilid amerliorates this attack. If the hostile peers can't join your network then they can't employ this kind of surveillance.This opinion is just from a cursory glance. I can't vouch for anything without looking under the hood.#Veilid #Mixnets #P2P #Networking #Privacy #Encryption #Cryptography