Power of the “d” – A Comparison of Decentralized VPNs (dVPN)

By January 6, 2020 January 7th, 2020 decentralised vpn, developers, mysterium node, payments

Network Design

A global collection of nodes power a VPN network by sharing bandwidth P2P in exchange for cryptocurrency.

Users can easily become a node and also download the free VPN app to select from a global menu of IP addresses/bandwidth providers.

VPN users connect to bandwidth sellers (nodes) using a directory. Node providers stake tokens to advertise these services.

Users install the Orchid VPN, add OXT to their wallet, and can then access the internet through their preferred path (single or multi-hop).

P2P VPN network also functioning as an SDK. Allows anybody to become a “resource node” by selling their unutilized computing resources in the marketplace.

Users mask their Internet traffic through a series of nodes.

A global VPN service which can provide Dedicated IP address, Double VPN, Onion Over VPN and connection to the Tor anonymity network. 

As well as dedicated data centre servers around the world, centralized VPNs also allow P2P traffic on certain servers  – there are hundreds of them in different locations around the world, optimized for file sharing.

How are nodes incentivised or rewarded?

Pilot program
Monthly bounties for UK, US, Italian and German participants, earning up to $600 in ETH per year. Only an email and IP address is required.  

P2P payment network
(coming soon)
Nodes set their own price based on supply and demand. This unique micropayments system utilises cryptocurrency payments, so nodes can sell their bandwidth in small intervals, ensuring security and convenience.

Stake-weighting
Anyone can operate an Orchid Node, but must first stake (lock up as collateral) the native OXT cryptocurrency. The more OXT that is staked, the more traffic they can receive, and the greater the chances of reward in the Network.

Orchid uses an advanced payments architecture known as probabilistic nanopayments for per-packet network payments.

Resource Nodes can earn the native $SENT token in return for contributing network bandwidth and other resources by hosting a Service Node for the dVPN Service.

Nodes are not incentivized in centralized VPNs as these businesses own the infrastructure and charge end users for the service.

Node Onboarding

Anyone can run a node using their computer, mining equipment or compatible hardware such as a Raspberry Pi. Link your node to your Ethereum wallet address via an easy to use dashboard, My.Mysterium.Network to track your earnings. 

No staking is required to be a node – sign up is free.

Anyone can run a node by signing up to the stake registry and provider directory on the blockchain. 

However, all new nodes must purchase and stake OXT to start receiving traffic.

Running a node requires technical knowledge of how to install a docker and configure a node. At present there is no user-friendly dashboard or application for download.

No need to onboard. By paying for the service, users get access to the VPN service, but do not help power it.

Costs & fees

While on testnet, the VPN is currently free to use.

Once live, users will pay in cryptocurrency for only the bandwidth they consume on a pay-per-use model.

Nodes pay no fees and earn cryptocurrency directly from users of this VPN service.

Users pay for the bandwidth in OXT.

Nodes pay OXT to advertise their services.

Using their on-chain, inbuilt ‘Token Swap’ feature, users can privately purchase $SENT tokens to access any service on the Sentinel network.

Running a node is free.

Monthly subscription model, rather than a pay-as-you-go structure. Users get access to a VPN service where they can select from IP addresses based all over the world to suit their browsing needs.

VPN Security

Layered protection protocols built to protect any individual or organization. Mysterium is a fast and scalable transport security layer to reinvent privacy via VPN. Traffic is encrypted and sharded into separate pieces, filtered in an unrecognisable form through the distributed node network — without the possibility of being traced or censored.

Users can select single- or multi-hop onion routed circuits by selecting nodes randomly weighted on stake and filtered by price, location, etc. A single hop route has the benefits of a normal VPN connection, creating a tunnel to route your traffic over a public network or your ISP, while a multi-hop connection provides additional privacy benefits by securing your network data from any one provider.

Swixer is Sentinel’s first utility that allows anybody to simply convert their cryptocurrency tokens online while keeping their data away from prying eyes. 

User’s privacy is enhanced by Swixer’s cross-chain swaps between the Ethereum chain and other blockchains which possess a working zero-knowledge protocol or privacy layer within the protocol.

Traditional VPN services route all users’ internet traffic through a remote server, hiding IP addresses and encrypting all incoming and outgoing data. For encryption, they use the OpenVPN and Internet Key Exchange v2/IPsec technologies in their applications.

One company admits their servers were hacked due to an expired internal private key being exposed, potentially allowing anyone to spin out their own servers imitating their own.

Logging policy

no logs! Mysterium protocol removes any technical possibility for collecting or storing logs centrally.

No logs.

No logs.

In theory, a centralized VPN *could* keep logs, but most state they are committed to a zero-logs policy.

Node Security

Mysterium allows users to select whitelisted traffic only, designed to protect nodes. However nodes can choose to accept any kind of traffic and increase their earning potential. They’ll soon identify and block bad actors from the network through the use of registered identities and reputation system.

Users can prevent certain kinds of attacks from malicious exit nodes by using a default exit node whitelist consisting of trusted VPN partners. Users can use their own whitelists, and eventually well known third parties will emerge as whitelist curators.

Sentinel is developing a relay network, where participants in the network can choose to be a relay or an exit node on which encrypted tunnels traffic between the VPN paid user and an exit node.

It will also involve the use of governance nodes which will dictate path of packet transmission between user and exit node.

Nodes are protected as the centralized VPN assumes all security and legal risks.

Ease of Use

VPN is a simple to use and free desktop or mobile application. 

New nodes can get set up in just 5 minutes and 5 steps via a simple, user-friendly dashboard. There is a knowledgebase and support team on hand to help. 

Users will need to have some basic understanding of cryptocurrency and must have an Ethereum wallet set up to receive payments.

Learn more about upcoming features.

VPN app designed for mobile and desktop. People wishing to be nodes must register and have some prior knowledge of cryptocurrency and staking.

Sentinel is not user-friendly and is better suited to more technically proficient users or those intuitive with Ethereum DApps and blockchain platforms.

Smart algorithms automatically select the best VPN server for you based on location, loads, or your special requirements.

They also have a dedicated support team.

Scalability

As with most P2P infrastructure, the more participants which join the network, the stronger and more robust it becomes.

Mysterium’s micropayments system is a homegrown Layer 2 solution. It was built to handle large volumes of users and transactions, making the network faster and more scalable.

Orchid uses a probabilistic payment system which scales to millions of transactions per second, enabling a highly liquid bandwidth market without a trusted central party.

Sentinel’s “multi-chain architecture” secures data exchange between people and both centralized and decentralized applications meaning. This is meant to solve problems with infrastructure and scaling.

Depends on high bandwidth throughput and fast connection speeds to provide an optimal service for their users. Often use multiple tunneling protocols to ensure their network can scale and can adapt to various needs.

Social following

11.3K Twitter Followers

2000 Medium Followers

2088 Telegram Members

27.1 K Twitter Followers

235 Medium Followers

4381 Telegram Members

3,392 Twitter Followers

336 Medium Followers

2946 Telegram Members

Not applicable.

Compatible with

Android, Mac, Windows, Linux.

iOS, Android, Mac, Linux, and (soon) Windows.

Mac, Windows, Linux, Android.

Android, Windows, Mac, iOS, Chrome/Firefox extension, Linux.

Decentralised?

You bet.

Of course.

Of course.

Nope. Decentra-what?

Network status

Testnet live – 900 residential nodes, with more than 300 live at any given point.

Between five and 10 node providers at launch, including players from both the traditional VPN world and “new entrants from the crypto space.”

83 nodes in the network, with an average of 28 at any time

Choose from over 5200 servers in 59 countries.

Also – several cases of being hAcKEd

Open Source?

Transparent and collaborative from Ground Zero – check out Myst codebase.

Duh. Everything to see here.

Yep. Peek under the hood here.

No – centralized VPNs are proprietary and closed source.

Leave a Reply

Please beware of scams. We will never ask you for your private keys.

X myStickymenu