RE: hidden website, #noRouter

You are viewing a single comment's thread from:

hidden website, #noRouter

in hidden •  6 years ago 

I found that interesting and wonder whether you would be willing to explain what the purpose of such websites is and how would it be found. Would it have a normal url, but then only show, as an example, as the above blue page?

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

The purpose of this type of website is to leave the masses and bot-activity. The hidden part is accidental, we take the data contained in the website and place it within the url which in turn causes a very long hash like url. This url is not unique but specific to the data so it could be re-created but because of its length it becomes hard to guess or find through cryptic work. Because lmza is used for compression, this drops this size of the data being pushed without loss of information. These are not hosted on a server this is how it becomes hidden without a router; although, a server is used to transfer the small decode Javascript file that file can be decentralized because it's not specific to any of these itty bitty sites.

Thank you.

I'm trying to imagine a way it could be useful to a large number of people - in other words, is there a way it could be used in a commercial way, preserving the secrecy of data of a customer or patient - or have I totally misunderstood?....

Users gain more privacy from the start, if the user uses a file Decryption script then the user experiences faster loading webpages/websites/web applications.

From the business pov, the pages are in a very long hash, increasing the time needed to Crack open the hash to the website data without the Decryption script. Since the data of the site are in hash form, they can be completely stored offline, increasing security of anything new or hidden.

Imagine it like this, a company keeps a public small splash page so their website can be found online with web searching. After that the data is opened user side and can be offline so if the user loses inet even for a second, their experience is unchanged. The hash is almost always smaller than the website outright, so we can also save storage space and ram use is lowered per page but the number of times we access ram is increased because we have to open a hash more often.

A company has to worry about cross server attacks, when one infected user/bad player gets data from another user or gains access to the other user's machine (through SSH), this no router hidden internet removes much of that issue.

This type of inet structure also uses full data access before viewing through a webviewer so if the data is infected, the infection can be noticed by having scripts run through the hash string as its being Decrypted before its set to be loaded on to the users screen.

So as you see both user and business can benefit but since the Decryption key can be decentralized meaning, it can be one of any server/node/dns/stored Decryption key that performs the same js functions so any configured server/node/dns/stored Decryption key could send the script to open the data. This can allow for a very capable scaling solution in a similar method to the tangle consensus protocol (any node can confirm any transaction but in this case, any server/node/dns/stored Decryption key can send the decryption base key for any site/request. If there's more secure sections within the first hash they can be decrypted by the user through shared info such as a user name and pass phrase.

I'm sorry this was long but I hope this answered your question

Thanks - and have bookmarked, in case I need it sometime. I appreciate your long answer, it did help make clear a lot more.