Gnosis VPN Logo

UNBLOCKABLE INTERNET

Gnosis VPN is a decentralized, trustless, uncensorable VPN for the web3 age. Fully anonymous browsing over a decentralized mixnet. Run a relay or exit node and get rewarded for supporting global private connectivity.
Gnosis VPN is developed by HOPR, and runs over the HOPR mixnet. If you run a HOPR node, you can already try the proof of concept version. The PoC was funded by GnosisDAO under GIP-98. This is a technical showcase: a more accessible client will be released in the coming months.
TRY PoC

SEE GNOSIS VPN IN ACTION

Loading...
Even at the proof of concept stage, Gnosis VPN can achieve high browsing speeds over the HOPR mixnet, including streaming at 720p. All footage was captured using the Gnosis VPN PoC running over the HOPR mixnet. Exit nodes hosted by Gnosis. Footage captured under ideal conditions. Actual performance can vary.
TRY GNOSIS VPN PoC
You can already try the Gnosis VPN PoC to anonymously access select sites and services within the Gnosis ecosystem. Click below and follow the instructions to apply for access. You’ll need to run your own full HOPR node for the PoC. Future versions will greatly reduce these technical requirements.

WHY GNOSIS VPN?

Web2.0 infrastructure harvests metadata and links activities and identities across domains
Lack of enforceable relationships in permissionless peer-to-peer networks means web3 infrastructure actually has worse privacy trust assumptions than the web2.0

I ALREADY HAVE A VPN!

Current VPNs are better than nothing (probably), but they come with unacceptable trust assumptions.
Centralized VPNs shield your metadata from websites, but not their server operators. These VPNs just replace trust in one server with trust in a different one.
As a web3 user on a centralized VPN, your anonymity set is the set of all users using:
  • The same RPC provider
  • Using the same VPN server
  • At the same time
This is almost certainly 1. So your identity can still be linked to activities on the web2.0 and web3.

FEATURES

TRUSTLESS
Decentralized architecture protects your IP and other metadata
GLOBAL
Data is relayed via a growing worldwide network of individual users
UNCENSORABLE
Gnosis VPN’s unique architecture makes it immune to standard VPN blocking techniques
(Features of full Gnosis VPN. The PoC has higher trust assumptions but still offers more privacy than most centralized VPNs.)

NEW LEVELS OF DIGITAL PRIVACY

Gnosis VPN will provide unprecedented levels of anonymity online, and even the proof of concept version provides stronger privacy than most currently available VPNs.
Gnosis VPNGnosis VPN PoCRegular VPNsDecentralized VPNsTOR
Unblockable

Cannot be censored by states, ISPs or website providers

Unblockable

Cannot be censored by states, ISPs or website providers

Surveillance-resistant

Each packet is routed through different nodes to hide your IP and other metadata

Surveillance-resistant

Each packet is routed through different nodes to hide your IP and other metadata

Web3 Incentives

Unlike traditional models, revenue goes to users running relay and exit nodes

Web3 Incentives

Unlike traditional models, revenue goes to users running relay and exit nodes

Protect metadata

Obscure your IP and other metadata.

Residential IPs

Using the residential IP range circumvents most VPN blockers

LET’S FIX VPNs FOR GOOD!

Gnosis VPN routes data through the underlying HOPR network. The traffic is sent through changing routes via multiple HOPR nodes which makes it impossible for the recipient or third parties to reliably figure out where the data originated. In addition, data packets are mixed up and transformed to prevent linkability of incoming and outgoing packets. The HOPR network is decentralized and run by hundreds of individual node runners all across the globe.

TRY THE GNOSIS VPN PoC!

The proof of concept is a work in progress and may be updated at any time. It may therefore be unstable or contain bugs, and should not be used in situations which require full anonymity. Use at your own risk. To manage load and aid with testing, an allow list of sites is currently enforced. For testing and debugging, exit nodes currently gather logs. These logs cannot reveal user requests, server responses, IPs or any other identifying information. Logs are deleted after thirty days.
* Windows currently not supported.

GnosisVPN.js

As a first step towards Gnosis VPN, you can now use GnosisVPN.js (previously: unlinked HTTP - uHTTP) which routes HTTP requests and responses through the HOPR network - right from your browser without installing any additional apps or services.


Exit nodes should be operated on premises by service providers. Please contact us if you would like to run a HOPR Session exit node to offer anonymous routing for your users.

WANT MORE?

If you liked our HOPR Session demo, check out more apps and showcases that we built at HOPR to highlight web3 privacy issues:
MINT A NON-PRIVATE NFT
CHECK YOUR WALLET ON DERP
DOX YOUR ETHEREUM VALIDATOR

FAQ

Why do we need Gnosis VPN?

Faq arrow

We spend more and more time online, but it’s becoming less private and free. VPNs are a rapidly growing response to this issue—a market estimated to be worth $70B a year. However, current VPNs come with unacceptable trust assumptions and are easily blocked. We need a VPN that anyone can use to access the internet as it was meant to be.

Does Gnosis VPN really protect all my data and metadata?

Faq arrow

GnosisVPN offers far better trust assumptions than current VPNs, even in the PoC. However, you still need to take care online. Like all other VPNs, Gnosis VPN exit nodes can see all plaintext HTTP requests and responses. Do not use them to route confidential information over unencrypted connections and make sure your browser always uses secure HTTPS and not unencrypted plain HTTP. While Gnosis VPN exit nodes allow anonymous access to the internet, you can still be deanonymized if you voluntarily expose information (e.g., plaintext credit card details).

When will Gnosis VPN be available?

Faq arrow

We’ve estimated a development period of two years to create a highly usable, globally scalable version of Gnosis VPN, while other versions for more technical users will be released intermittently. The proof of concept version is already available to try.

How do I try the proof of concept?

Faq arrow

You can try the proof of concept here. You’ll need to run a HOPR node for it to work and be comfortable with using the command line interface (CLI). Certain stages require you to wait for access approval, so please be patient.

Can I use Gnosis VPN PoC where I live?

Faq arrow

While we believe unblockable encrypted internet should be available to all, sadly not everyone agrees. Users should check local laws before using the PoC (including operating a relay node). Users are solely responsible for how they use and interact with the PoC, and for complying with applicable laws. The PoC should not be used for illegal, malicious or unethical purposes.

Why does the proof of concept have an allow list?

Faq arrow

Although we’re pleased with the progress made developing the PoC, with packet transfer rates 60x higher than estimated at the start of development, the underlying HOPR network is still vulnerable to sudden spikes in traffic. As we scale the network, these restrictions will gradually be removed.

I want to run a node! What should I do?

Faq arrow

Exit nodes for Gnosis VPN are currently hosted on Gnosis infrastructure. We’ll announce when this is opened up to outside participation. In the meantime, you can help by running a HOPR node to relay data within the HOPR mixnet. Get started here.