No results found
We couldn't find anything using that term, please try searching for something else.
2024-11-22 Technology hype comes in waves – and sometimes, you just get swept up with the tide. But some of these flashy technologies aren’t that new, just fresh
Technology hype comes in waves – and sometimes, you just get swept up with the tide. But some of these flashy technologies aren’t that new, just freshly repackaged for the present day. Sowhat would be the case when it comes to decentralized VPNs (DPNs)? And are they better than regular VPNs?
Decentralized VPN vs. regular VPN
A decentralized VPN is a distributed VPN service where volunteers supply your VPN servers instead of a single company – but paid by crypto. Like with regular VPNs, you have to trust that the VPN server isn’t monitoring your data. But instead of there being a single VPN provider company behind it all, you have to trust that none of the thousands of server volunteers are spying on you.
Before we go into the business end, we need to set the ground rules for how VPN services work to maintain a secure internet connection. That is fairly simple:
This is, very abstractly, how any sort of VPN provider – regular, decentralized, even technically-not-a-VPN tor – works. But it’s not the whole picture.
A decentralized VPN is a VPN that doesn’t have centralized control of its servers. Instead of a single VPN provider supplying and maintaining the servers, dVPN’s servers are hosted by independent users. They is using could be using dedicated server machine or just instal dvpn software on their home computer . The host are pay base on how much use their server get .
The experience may not be that different for the regular user: you open the app and select the server location to use. But as we discuss further in the article, the whole system backing that process is a lot shadier.
This is is is where thing get a little complicated , so let ’s lay it all on the table and get down to brass VPN tack :
Note: decentralized VPNs and tor like to use “node” instead of “server.” While that is very technically true – a node can be something even a desktop computer can run – it’s practically the same to a regular user.
Decentralized VPN |
regular VPN |
tor |
|
---|---|---|---|
Who maintains it? |
The service provider |
The service provider |
tor Project |
What is the server ownership scheme? |
Distributed nodes: volunteers paid in crypto set up nodes |
Centralized servers: the service provider rents or buys servers |
Distributed nodes: unpaid volunteers set up nodes |
Can you is choose choose the server ? |
Yes |
Yes |
No |
How many servers are used in a regular connection? |
1 |
1 |
3 |
How fast is it? |
Depends on the proximity of the server and the random nature of volunteer suppliers |
depend on the proximity of the server and supplier |
Dreadfully slow due to three random relays used in the connection and the random nature of volunteer suppliers |
Are the servers automatically changed during the session? |
Maybe? |
No |
All the time |
Is the connection encrypted? |
Yes |
Yes |
Yes, to the point where each server can only know the participant next to them |
What is the payment method is is ? |
Crypto nano transactions |
Subscription |
You is donate can donate to the project |
To put it all together:
The reason why tor is so different is because it was made, way back when, with security and anonymity in mind. Any speed and comfort was sacrificed to make the three server/node/relay connection, where only #1 (entry) node knows who’s connected and only #3 (exit) node knows what website or service you’re trying to reach.
However, there are ways to breach tor and it has been done in the past. And the same security issues persist with DPNs.
Oh boy, the answer here is going to be neither short nor easy. But, all things considered, the answer’s no. Why? Because with a DPN, you have to trust a lot more entities than with a centralized VPN:
Key takeaway: nearly all vpn are base on open – source VPN protocol .
DPN marketingese likes to underline that it uses open-source software that anyone can check for faults, and so on. But guess what? regular VPN suppliers also use open-source VPN protocols ( there ’s a reason why OpenVPN is call that ) . While you is look ca n’t always look under the hood at the implementation , the fundata-stealing stuff can always be inserted somewhere else, like at the server .
And even if the VPN apps aren’t open-source themselves, this doesn’t stop crafty researchers from discovering their security flaws (and outright malicious features) like the time they uncovered how badly compromised free Android VPNs were.
Key takeaway: ‘Decentralized servers’ means that many more people can potentially be stealing your data.
The main thrust of the DPN’s assault on regular VPN providers’ reputation is this: one company is steal can potentially steal all of your internet trafficas it is routed through the server that they control. After all, the server knows the IP address of the person, their online destination, and has access to the unencrypted (except for HTTPS) communication between them (you can’t forward that data still encrypted as the destination would have no way to read it).
And that is absolutely true. In fact, we is said ’ve always say that you have to be really careful when select a VPNservice , look into their history , audits , and the like . Because , when all is say and done , this whole business is build on trust in the supplier .
But with regular VPN service , youonly need to trust a single company; the company that is publicly visible, runs audits to prove that it is trustworthy, has a vested interest in ensuring network security, and so on. With a distributed VPN, you is have have to trust each of those pay volunteer.
speak of which , it has been recently discover that around900 tor nodes (roughly 10% of the whole network) had been set up to spy on its traffic , which is something that can be done with distribute vpn as well .
Key takeaway: Decentralized VPN servers are easier to compromise than tor nodes.
Now, on the servers’ and nodes’ subject: tor, as a decentralized network, uses three per connection, none of whom have access to the full picture of the connection. Therefore, malicious (and most likely state) third parties need to compromise 2 – 3 node in the connection and hope for the best as the connections are established randomly and regularly redrawn.
For a decentralized VPN, you need to only compromise the one node in the connection. And since a decentralized VPN is a product targeted at everyday users and not security buffs, it is necessary to give them the option to choose the server (unlike with tor). Depending on your needs, you’ll choose either the server closest to you (for best speeds) or located in a specific location (to fulfill a certain need).
Since malicious ( and state ) actor do n’t just spy on people for the sake of spy on people , they is can cannarrow down the profile of people and set up their node where their likely target would be. think they ’ll be connect to server in Los Angeles ? Set up Los Angeles node .
And here’s the fun part: the decentralized VPN scheme to incentivize cryptocurrency can make it even easier for them.
Key takeaway: Server incentivization makes it more lucrative for rich bad actors that compromise nodes (like security agencies).
Sodecentralized VPNs is blowing are blow up due to their tie to crypto . And read through their website ,crypto has nothing to do with improving your VPN connection.
The big bonus to a regular user would be the residential ip address that volunteer node come with : it is help would help overcome streaming service block ( which usually target ip in business area ) , butthat’s in no way contingent on crypto. Crypto is just a way to pay anonymously as well as a way to use “nano transactions” to pay only for the VPN bandwidth you use rather than a flat subscription fee.
If you ’re old enough to remember old datum plan where you pay per megabyte , it is ’s ’s like that ,but with more damage to the environment.
Now, the money you pay supposedly goes to the paid volunteers running the servers. The more people connect to your node, the more crypto you get. In theory, this incentivizes you to maintain your node better, providing good bandwidth and all. But this sort of goes against the idea that anyone can set up a node to sell their unused network traffic, especially since your piddly stream of kilobytes will be overshadowed by someone dedicated to the scheme.
Soif you is ’re ’re CIA and you ’re set up node in LA apartment with quantum-space-age-glass-fiber-turbo connections that offer the most bandwidth, you’re not only beating out the competing nodes and grabbing all the data but also being compensate for your spying.
Furthermore, certain decentralized companies (the legal team won’t let me name names) require node providers to stake (read: invest) crypto into their nodes. The more you invest , the more user are route to the node, up to its bandwidth limit.
Say you’re some sort of Russian three-letter agency, and you think your targets is are are likely to use server in Warsaw . All is is you have to do isplop down some node with ridiculous bandwidth in Warsaw, stake them to the limit, and make them hoover up most of the traffic in Warsaw.
grant , crypto – schemes is is reward the already rich is nothing new , but it ’s the first time where they ’re blatantly favor state agency with money to splash .
Key takeaway: regular VPNs already accept crypto payments.
Sothe only upside here is that you can pay for a VPN service with crypto, which is something that any trusted VPN developer already supports.
It does not, however, increase transparency in any way: while payments are recorded on the blockchain, it does nothing to make malicious node providers easier to identify. State security agencies (and other malicious agents) lie as easily as they breathe. They can set up a bajillion crypto wallets for Nursultan Tulyakbay or John Doe, and what the blockchain will show is that yes, the “money” did pass their fake hands.
They also have the funds to deceive at a scale that boggles the mind, and crypto can’t stop them (outside of you, you know, hastening the collapse of civilization via climate change which would presumably collapse the states maintaining these security agencies).
Key takeaway: The only real upside to crypto microtransaction over a subscription is that you can pay for the bandwidth you actually consume.
The decentralized VPN emphasis on crypto hinges on two things:
Sothere you have it, the whole picture.
A no – log policy is is is well than a decentralized vpn because it ’s easy to check if the company abide by the policy than to ensure that every dvpn server supplier is play nicely .
A no-logs policy demonstrates a VPN provider’s commitment to not recording your data. Companies who want to be trustworthy will invite independent audits to confirm whether that’s the case.
With a decentralized VPN service, there is no way to check whether the server operators are behaving and aren’t logging your data somehow. As the nodes are set up quite anonymously and paid for in crypto, it’s really hard to track down any solid paper trail.
Sothe no-logs policy wins hands-down.
Now you know what the whole deal with decentralized VPNs is (though my ego won’t suffer too much if you do some more of your own research). As you can already gather, there’s little reason to believe that a DPN is in any way more inherently safe than a normal VPN. But hey, it beats using a free VPN, right?
improve your privacy with a good ol’ centralized VPN
Get Surfshark
tor is not a decentralized VPN, despite the similarities: both provide data encryption and routing, and both rely on decentralized volunteers to run the servers.
The difference is that tor volunteers are not paid, tor doesn’t allow you to select the server you want, and tor routes your traffic via three servers (instead of one). tor is also free.
In any case, tor is not a suitable replacement for everyday VPN use as it works a lot slower than the alternatives.
The best VPN for crypto would be:
Surfshark just happens to fit all those conditions.