-
-
Notifications
You must be signed in to change notification settings - Fork 2.4k
Description
Is your feature request related to a problem? Please describe.
Advertisers and malicious actors can map your IP address with websites you visit. If an attacker can get control of the VPN server, or monitor the network of the server, they will be able to match VPN clients with their traffic, nullifying the privacy benefits of the VPN. In case of Algo it's even more important: all traffic from server's IP address completely belongs to VPN owner.
Such timing/correlation attacks are not difficult to accomplish. In countries with restrictive Internet regulations (China, Russia, Iran, Turkey, etc), or countries with broad surveillance powers (USA, UK, etc), state surveillance agencies typically have the legal ability to coerce either the VPN provider, or the network/server provider of the VPN provider, to assist with such network monitoring.
Describe the solution you'd like
Create three instances of Algo in different locations and route all traffic through each of these servers (similar to Tor). For example:
user <-> Algo server #1 (UK) <-> Algo server #2 (Sweden) <-> Algo server #3 (Swiss) <-> website
Describe alternatives you've considered
Similar solution is used by ProtonVPN Secure Core:
https://protonvpn.com/support/secure-core-vpn/