Replies: 2 comments 5 replies
-
|
Ha! That's a great question. So while the p2p traffic is e2e encrypted, by definition everything posted on Rostra is public as Rostra is fundamentally meant to facilitate public interactions. Also p2p connections do expose IP address. Having said that I did some thing and experimenting and the plan is as follows:
|
Beta Was this translation helpful? Give feedback.
-
I understand that. But public posts doesn't mean that my local ISP, or other network observers, see my connection to some other peer in the France, or some other country. Am I presenting a somewhat accurate picture if I say that currently with rostra, I am making it visible to the network observers that my machine is making a connection to the person I am following's country? What more can a network observer (by looking at the coming and going internet packets, not the public post contents) deduce? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Using on the clearnet, I am assuming there is no protection against traffic observance/surveillance. Is it on the cards for rostra to have some sort of tor hidden service integration, ie, connect to the friends'/peers'
.onionURLs or something like that.Beta Was this translation helpful? Give feedback.
All reactions