Preferences

That is a very broad question that I keep looking back to and thinking "I'll answer other questions and get back to this one ;P", but I'm thinking maybe I should simply refer you to the almost 50-page whitepaper on our website. I am here to answer any questions you might still have (and I totally believe you will, as that whitepaper is a draft)!

https://orchidprotocol.com/whitepaper.pdf


woodandsteel
The whitepaper is way over my head

How about a more specific question. If someone uses Orchid to accesse a website, can the website identify their IP address?

saurik OP
The website will see the IP address of the exit node connecting to it, not the IP address of the user connecting to the network. You can then ask the question "what if the people running the website are also running nodes on this network and are actively attempting to do various forms of information correlation attacks including active experiments on the traffic flow", then I really am going to have a hard time accurately summarizing the whitepaper.

However, I see now that I didn't bother answering your first question, due to the complexity of the second ;P.

> Is this anonymous like tor or i2p?

The answer to this question is "yes", though we are aiming to be even better than those projects (in different ways).

woodandsteel
Thank you for your answer.

This item has no comments currently.