also removed mentions of kovri from all files
1.6 KiB
summary | terms | |
---|---|---|
The Internet in which anonymous overlay networks are built upon |
|
{% include disclaimer.html translated="no" translationOutdated="no" %}
The Basics
When you use the Internet for things like news, email, social media, and even Monero, you are most likely using a clearnet connection. This means that all of your connections can be tracked, traced, and monitored by:
and even if you use HTTPS or similar (which encrypts your transmission), your route is not hidden nor is it anonymous, thus; it is in the clear.
In-depth information
Since a traditional VPN cannot save you from clearnet (as you are still using clearnet (though you are more proxied than without a VPN)), you should use an anonymous overlay network to avoid using clearnet directly:
-
Java-I2P
These technologies protect you from clearnet by building an anonymous network over clearnet to keep your transmissions both encrypted and anonymous.
Here is an accurate, interactive diagram provided by the EFF which describes clearnet as it relates to Tor. The concept also (somewhat) applies to I2P in terms of anonymity with the exception that your traffic never need to leave the I2P network