Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Maybe you want to take a look at stealth [1] as you've seem to understood the real strength of a browser with a decentralized (and delegateable) request system.

Personally I don't think the strength of p2p is only trust, it's delegation. If you have peer to peer encryption running, the possibilities are endless.

Add a statistical "proof of authenticity" and you have an unbeatable anti censorship mechanism that can also identify in-page modifications and weed out malicious MITMs in between.

[1] https://github.com/tholian-network/stealth



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: