Gnosis VPN | Gnosis VPN PoC | Regular VPNs | Decentralized VPNs | TOR | |
---|---|---|---|---|---|
Unblockable Cannot be censored by states, ISPs or website providers | |||||
Unblockable Cannot be censored by states, ISPs or website providers | |||||
Surveillance-resistant Each packet is routed through different nodes to hide your IP and other metadata | |||||
Surveillance-resistant Each packet is routed through different nodes to hide your IP and other metadata | |||||
Web3 Incentives Unlike traditional models, revenue goes to users running relay and exit nodes | |||||
Web3 Incentives Unlike traditional models, revenue goes to users running relay and exit nodes | |||||
Protect metadata Obscure your IP and other metadata. | |||||
Residential IPs Using the residential IP range circumvents most VPN blockers |
Why do we need Gnosis VPN?
We spend more and more time online, but it’s becoming less private and free. VPNs are a rapidly growing response to this issue—a market estimated to be worth $70B a year. However, current VPNs come with unacceptable trust assumptions and are easily blocked. We need a VPN that anyone can use to access the internet as it was meant to be.
Does Gnosis VPN really protect all my data and metadata?
GnosisVPN offers far better trust assumptions than current VPNs, even in the PoC. However, you still need to take care online. Like all other VPNs, Gnosis VPN exit nodes can see all plaintext HTTP requests and responses. Do not use them to route confidential information over unencrypted connections and make sure your browser always uses secure HTTPS and not unencrypted plain HTTP. While Gnosis VPN exit nodes allow anonymous access to the internet, you can still be deanonymized if you voluntarily expose information (e.g., plaintext credit card details).
When will Gnosis VPN be available?
We’ve estimated a development period of two years to create a highly usable, globally scalable version of Gnosis VPN, while other versions for more technical users will be released intermittently. The proof of concept version is already available to try.
How do I try the proof of concept?
You can try the proof of concept here. You’ll need to run a HOPR node for it to work and be comfortable with using the command line interface (CLI). Certain stages require you to wait for access approval, so please be patient.
Can I use Gnosis VPN PoC where I live?
While we believe unblockable encrypted internet should be available to all, sadly not everyone agrees. Users should check local laws before using the PoC (including operating a relay node). Users are solely responsible for how they use and interact with the PoC, and for complying with applicable laws. The PoC should not be used for illegal, malicious or unethical purposes.
Why does the proof of concept have an allow list?
Although we’re pleased with the progress made developing the PoC, with packet transfer rates 60x higher than estimated at the start of development, the underlying HOPR network is still vulnerable to sudden spikes in traffic. As we scale the network, these restrictions will gradually be removed.
I want to run a node! What should I do?
Exit nodes for Gnosis VPN are currently hosted on Gnosis infrastructure. We’ll announce when this is opened up to outside participation. In the meantime, you can help by running a HOPR node to relay data within the HOPR mixnet. Get started here.