RE: hidden website, #noRouter

You are viewing a single comment's thread from:

hidden website, #noRouter

in hidden •  6 years ago 

Users gain more privacy from the start, if the user uses a file Decryption script then the user experiences faster loading webpages/websites/web applications.

From the business pov, the pages are in a very long hash, increasing the time needed to Crack open the hash to the website data without the Decryption script. Since the data of the site are in hash form, they can be completely stored offline, increasing security of anything new or hidden.

Imagine it like this, a company keeps a public small splash page so their website can be found online with web searching. After that the data is opened user side and can be offline so if the user loses inet even for a second, their experience is unchanged. The hash is almost always smaller than the website outright, so we can also save storage space and ram use is lowered per page but the number of times we access ram is increased because we have to open a hash more often.

A company has to worry about cross server attacks, when one infected user/bad player gets data from another user or gains access to the other user's machine (through SSH), this no router hidden internet removes much of that issue.

This type of inet structure also uses full data access before viewing through a webviewer so if the data is infected, the infection can be noticed by having scripts run through the hash string as its being Decrypted before its set to be loaded on to the users screen.

So as you see both user and business can benefit but since the Decryption key can be decentralized meaning, it can be one of any server/node/dns/stored Decryption key that performs the same js functions so any configured server/node/dns/stored Decryption key could send the script to open the data. This can allow for a very capable scaling solution in a similar method to the tangle consensus protocol (any node can confirm any transaction but in this case, any server/node/dns/stored Decryption key can send the decryption base key for any site/request. If there's more secure sections within the first hash they can be decrypted by the user through shared info such as a user name and pass phrase.

I'm sorry this was long but I hope this answered your question

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

Thanks - and have bookmarked, in case I need it sometime. I appreciate your long answer, it did help make clear a lot more.