algo icon indicating copy to clipboard operation
algo copied to clipboard

Support for "exit node" with different IP address

Open tim1234567 opened this issue 6 years ago • 3 comments

Is your feature request related to a problem? Please describe. Advertisers and malicious actors can map your IP address with websites you visit. If an attacker can get control of the VPN server, or monitor the network of the server, they will be able to match VPN clients with their traffic, nullifying the privacy benefits of the VPN. In case of Algo it's even more important: all traffic from server's IP address completely belongs to VPN owner.

Such timing/correlation attacks are not difficult to accomplish. In countries with restrictive Internet regulations (China, Russia, Iran, Turkey, etc), or countries with broad surveillance powers (USA, UK, etc), state surveillance agencies typically have the legal ability to coerce either the VPN provider, or the network/server provider of the VPN provider, to assist with such network monitoring.

Describe the solution you'd like Create three instances of Algo in different locations and route all traffic through each of these servers (similar to Tor). For example:

user <-> Algo server #1 (UK) <-> Algo server #2 (Sweden) <-> Algo server #3 (Swiss) <-> website

Describe alternatives you've considered Similar solution is used by ProtonVPN Secure Core: https://protonvpn.com/support/secure-core-vpn/

tim1234567 avatar Oct 23 '19 22:10 tim1234567

See #1605.

TC1977 avatar Oct 24 '19 03:10 TC1977

In my case, I redirect all traffic to Tor transport port creating your own tor network

dsecuma avatar Oct 27 '19 10:10 dsecuma

See #1605.

That partially solves the case, but better than nothing. Thanks!

In my case, I redirect all traffic to Tor transport port creating your own tor network

An interesting approach to tackle the problem, I'll take a look. Thanks!

tim1234567 avatar Oct 30 '19 09:10 tim1234567