mirror of
https://github.com/safing/web
synced 2025-04-23 20:39:09 +00:00
Add Infound Txt feedback for editing
This commit is contained in:
parent
ab08dd2a93
commit
3adf1ce11f
4 changed files with 124 additions and 0 deletions
37
_drafts/Port 17.md
Normal file
37
_drafts/Port 17.md
Normal file
|
@ -0,0 +1,37 @@
|
|||
# Port 17
|
||||
|
||||
Port17 brings together several state of the art network technologies and gives them a new spicy twist 🌶️.
|
||||
|
||||
The goal of Port17 is to protect connection data as well as metadata from [surveillance capitalism](#linktoarticle).
|
||||
|
||||
### Adapted core concepts:
|
||||
- To protect your privacy, we use newest proven encryption technology: a double ratchet 1 based protocol to provide perfect forward and backward secrecy which can change used algorithms on demand through configuration.
|
||||
- The onion-encrypted multi-hop architecture 2 protects your identity and makes you anonymous online.
|
||||
- Zero roundtrip connection establishment enable blazing fast connections.
|
||||
- Paid community nodes are highly welcome to build a huge, capable and trustless network.
|
||||
|
||||
### The new spicy twist 🌶️:
|
||||
- To protect network data and metadata as long as possible, Port17 selects exit nodes 3 in proximity to the destination server.
|
||||
- Routes are calculated for maximum speed by default and use a minimum of 3 nodes. This behavior changes based on the active security level, providing slower, but tougher routes with more nodes.
|
||||
- Exit node 3 selection can be influenced up to application/domain pairs.
|
||||
- Unencrypted connections are only handled by trusted nodes run by Safing. In this sense we act as a trusted anchor until all the web is encrypted. There is no room for MITM-ing 4 nodes.
|
||||
- As soon as the network has a good share of community nodes, routing will diversify routes by node ownership to further reduce needed trust on single parties (us).
|
||||
- Tunnels are layer 5 5 and up to reduce unnecessary metadata and improve speed (similar to SOCKS proxies).
|
||||
- Clients always know about the full network. (will require improved method for better scaling at some point)
|
||||
- Authentication is decoupled from network nodes - they only know that someone is allowed to use the network, but not who.
|
||||
- Payment via cryptocurrencies allows unblockable payment access.
|
||||
- Tight integration with Portmaster ensures that no data will ever leak should a tunnel break. (unlike VPNs)
|
||||
|
||||
A final note: You may have noted that Port17 is, in some aspects, similar to the Tor Project. The key difference is, that Port17 focuses on speed and usability, but does not claim to match Tor’s level of security. We will provide a in-depth comparison in the future.
|
||||
|
||||
### Stamp
|
||||
Stamp is an online community where participants “stamp” (ie. tag, categorize) domains and applications (used by Portmaster for application profiles) to serve as a data source for any kind of network filter. Contributions are rewarded with reputation that gives them more influence on the platform. This reputation system will be blockchain-based in the future. Stamp is a separate project that is backed by Safing.
|
||||
|
||||
### Further Reading
|
||||
Find the full docs: coming soon
|
||||
Find our source code on Github.
|
||||
Double Ratchet Algorithm ↩
|
||||
Onion routing ↩
|
||||
final network node from which the connection is made to the destination server ↩ ↩2
|
||||
Man-in-the-Middle Attack ↩
|
||||
OSI network model ↩
|
9
_drafts/Port Master.md
Normal file
9
_drafts/Port Master.md
Normal file
|
@ -0,0 +1,9 @@
|
|||
# Port Master
|
||||
|
||||
## Portmaster is an application firewall that enforces application profiles on processes.
|
||||
|
||||
Being an application firewall means tightly integrating with the kernel of the underlying OS (via network filter APIs or kernel modules) to gain needed information (associate network packets to processes) and control (block or deny network connections).
|
||||
|
||||
Application profiles describe an application’s behaviour in the sense of how it interacts with the Internet: Does it connect to a fixed set of domains? Is it a peer to peer application? Does it interact with the local network? Should TLS be enforced and checked? etc.
|
||||
|
||||
Profiles represent an application as experienced by the user, not as defined by technology - making them easy to understand and superior to other common application classification approaches. They can be either created by users themselves or - most of the times - obtained through Stamp (explained later).
|
62
_drafts/Safing-Home.md
Normal file
62
_drafts/Safing-Home.md
Normal file
|
@ -0,0 +1,62 @@
|
|||
Safing.io home page
|
||||
* * *
|
||||
|
||||
**Safing**
|
||||
Your digital safe harbor
|
||||
|
||||
## Take back control of your data.
|
||||
|
||||
We provide you with a simple but powerful tool that manages your connections to the Internet — protecting your privacy. [Learn about Port Master](#)
|
||||
|
||||
On top of that we make sure the data sent out is protected from prying eyes on the way to its destination. [Learn about Port 17](#)
|
||||
|
||||
—
|
||||
|
||||
### Portmaster, Your application firewall
|
||||
The Port Master ensures that applications only send data to service providers you trust. This way your device leaks no data. To ensure usability and effectiveness the firewall has pre-configured application profiles which know which connections are required for an optimal and private experience.
|
||||
|
||||
[Get Port Master](/portmaster)
|
||||
|
||||
—
|
||||
|
||||
### Port17, Your secure network
|
||||
The Port 17 Network ensures that the data you send out is safe ~~and private~~. While active, all your traffic is routed through the secure network, which makes your Internet traffic private and anonymous. As a result websites you visit do not know who you are (unless you tell them) or where you are located, nor does your Internet service provider (ISP) know where you connect to. And because your privacy is our top priority we built the whole system in such a way, that not even we can feasibly retrace the connections you made.
|
||||
|
||||
[Learn more about Port 17](/port17)
|
||||
|
||||
—
|
||||
|
||||
## Our Values
|
||||
—
|
||||
|
||||
### Privacy First
|
||||
We believe „everyone has the right to the protection of personal data“ (as stated in Article 8 of The Charter of Fundamental Rights of the European Union). This has become increasingly difficult in an age where private data is being harvested in masses, also called [surveillance capitalism](/link—to-Shoshana-Zuboff-source-or-subpage).
|
||||
|
||||
Our mission at Safing is to make sure **everyone can protect their digital selves without making compromises in usability or privacy**. We give users back control over their data.
|
||||
|
||||
—
|
||||
|
||||
### Open Source
|
||||
To ensure maximum privacy for our users and to build trust we need to be transparent in every aspect. That’s why we publish ~~all of our hard work~~ our software as open source. This way you can have a look at our source code and inspect if we truly stay to our word.
|
||||
|
||||
—
|
||||
|
||||
### Ethical Funding
|
||||
Taking money always means opening up to influences. That is why we see it as our responsibility to be thoughtful about taking investments. We do not want parties to gain influence which do not or might not stand behind our values. That is why we choose to take more personal risks instead of selling parts of our company for easy money.
|
||||
|
||||
[Learn more about funding approach](/about/support-us)
|
||||
|
||||
**Take back control of your data.**
|
||||
[Try Port17](/port17)
|
||||
|
||||
**Want to get involved?**
|
||||
[Join our community](/community)
|
||||
|
||||
|
||||
|
||||
* * * * * * * * * * * * * * * * * * * * *
|
||||
NOTES
|
||||
|
||||
Give you the opportunity to choose whome you want to share your data with.
|
||||
|
||||
Surveillance capitalism in short is the growth and income focus of capitalism paired with the information gathered from huge amounts of personal data. This combination results in more and better tracking of user behavior to exploit them financially.
|
16
_drafts/Support us.md
Normal file
16
_drafts/Support us.md
Normal file
|
@ -0,0 +1,16 @@
|
|||
Support us
|
||||
* * *
|
||||
|
||||
## Transparent Funding Policy
|
||||
|
||||
For us, ethical funding also means we want to make sure that our users know who paid for the programs and services they use.
|
||||
|
||||
As a result we have adopted a transparent funding policy to openly share how we are funded. All our funding (and partnerships) will remain public!
|
||||
|
||||
## Clear Business Model
|
||||
|
||||
Instead of pushing a free product and worry about the business model later (cough - selling user data - cough) we want to have that part figured out right from the start. So this is how we’ll do it:
|
||||
|
||||
**Portmaster** is and always will be free. ‘Put you back in control of your data’ is our core vision, which is why we concluded to release Portmaster for free.
|
||||
|
||||
**Port17** will be a subscription based service. Of course we need to cover our costs and pay our bills. But more importantly we want to have the funds to further engage in our mission and to extend our services. That is why we decided on the subscription model - instead of building just on donations - which we feel would be infeasible.
|
Loading…
Add table
Reference in a new issue