Skip to content

Support for "exit node" with different IP address #1626

@tim1234567

Description

@tim1234567

Is your feature request related to a problem? Please describe.
Advertisers and malicious actors can map your IP address with websites you visit. If an attacker can get control of the VPN server, or monitor the network of the server, they will be able to match VPN clients with their traffic, nullifying the privacy benefits of the VPN. In case of Algo it's even more important: all traffic from server's IP address completely belongs to VPN owner.

Such timing/correlation attacks are not difficult to accomplish. In countries with restrictive Internet regulations (China, Russia, Iran, Turkey, etc), or countries with broad surveillance powers (USA, UK, etc), state surveillance agencies typically have the legal ability to coerce either the VPN provider, or the network/server provider of the VPN provider, to assist with such network monitoring.

Describe the solution you'd like
Create three instances of Algo in different locations and route all traffic through each of these servers (similar to Tor). For example:

user <-> Algo server #1 (UK) <-> Algo server #2 (Sweden) <-> Algo server #3 (Swiss) <-> website

Describe alternatives you've considered
Similar solution is used by ProtonVPN Secure Core:
https://protonvpn.com/support/secure-core-vpn/

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions