mirror of
https://github.com/monero-project/monero-site.git
synced 2024-12-24 04:29:34 +00:00
Moneropedia: add Clearnet entry
Referencing: -monero-project/kovri#256 -monero-project/monero-site#155
This commit is contained in:
parent
9e7e99b52f
commit
e8aa590f00
2 changed files with 35 additions and 1 deletions
33
knowledge-base/moneropedia/clearnet.md
Normal file
33
knowledge-base/moneropedia/clearnet.md
Normal file
|
@ -0,0 +1,33 @@
|
|||
---
|
||||
layout: moneropedia
|
||||
entry: "Clearnet"
|
||||
tags: ["kovri"]
|
||||
terms: ["clearnet"]
|
||||
summary: "The internet in which anonymous overlay networks are built over"
|
||||
---
|
||||
|
||||
### The Basics
|
||||
|
||||
When you use the internet for things like news, email, social media, and even Monero, you are most likely using a clearnet connection. This means that *all* of your connections can be tracked, traced, and monitored by:
|
||||
|
||||
- your [ISP](https://en.wikipedia.org/wiki/ISP)
|
||||
- the website/service/person you're communicating with
|
||||
- possibly a [Five Eyes](https://en.wikipedia.org/wiki/5_Eyes) capable entity
|
||||
|
||||
and even if you use [HTTPS](https://en.wikipedia.org/wiki/HTTPS) or similar (which *encrypts* your transmission), your route is not hidden nor is it anonymous, thus; it is in the *clear*.
|
||||
|
||||
### In-depth information
|
||||
|
||||
Since a traditional [VPN](https://en.wikipedia.org/wiki/VPN) cannot save you from clearnet (as you are still using *clearnet* (though you are more proxied than without a VPN)), you should use an *anonymous overlay network* to avoid using clearnet directly:
|
||||
|
||||
- @Kovri
|
||||
- @I2P
|
||||
- [Tor](https://torproject.org/)
|
||||
|
||||
These technologies protect you from clearnet by building an anonymous network **over** clearnet to keep your transmissions both encrypted **and** anonymous.
|
||||
|
||||
Here is an accurate, [interactive diagram](https://www.eff.org/pages/tor-and-https) provided by the [EFF](https://www.eff.org/) which describes *clearnet* as it relates to **Tor**. The concept also (somewhat) applies to @Kovri and @I2P in terms of anonymity with the exception that:
|
||||
|
||||
- @Kovri/@I2P does not use exit nodes when connecting to an @eepsite
|
||||
- Your traffic ever need to leave the @I2P network.
|
||||
- You do not need HTTPS to use @Kovri/@I2P (with the exception of @reseed) **TODO(anonimal): finish**
|
|
@ -18,7 +18,8 @@ TODO(anonimal): finish
|
|||
|
||||
@eepsite (@hidden-service, @garlic-site, @garlic-service)
|
||||
|
||||
- Kovri Clearnet
|
||||
@clearnet
|
||||
|
||||
- Kovri Cryptography (encryption, signatures, etc.)
|
||||
- Kovri Network Database (RI, lease-sets, floodfill, etc.)
|
||||
- Kovri Reseed
|
||||
|
|
Loading…
Reference in a new issue