CONET PROJECT
Launch CONETSilent Pass VPN
  • Welcome To CONET
    • Introduction
    • Background
      • Personal Information
        • Collection Of Personal Information
        • New Business Opportunities
          • AI
          • CLOUD COMPUTING
          • SEARCH ENGINE
          • BLOCKCHAIN
      • Decentralized Physical Infrastructure Network
    • CONET Manifesto
    • CONET Philosophy
  • Core Technology
    • How CoNET Works: Decentralized, Private, and Secure
    • Wallet-to-Wallet encrypted network communication protocol
      • Internet Protocol
        • TCP/IP Protocol
        • Internet TCP/IP Communication Privacy Threats
        • Internet Privacy Communication Solutions
      • Layer Minus Protocol
        • Layer Minus
        • Privacy Threats of the Layer Minus Protocol
    • CONET Platform
      • CONET Wallet
    • CONET Power Card
  • CoNET DePIN Blockchain
  • Staking
  • Nodes
    • Node Benefits for Guardians and CoNETian NFT
  • Silent Pass Proxy/VPN
    • B2B and B2C Solution
    • VPN vs Proxy
    • Silent Pass CDN
  • RPC
  • Tokenomics
    • Token Economic Model
    • Utilities and Economic
    • CONET Consensus Protocol
    • Token Distribution
    • Community-Driven Vision for Web3
  • Early Access Plans
    • Guardian Plan
      • Guardian Plan V2
    • The Conetian Plan
  • Community Incentive Program
    • The CoNETian Minigame
  • Road Map
  • Resource
  • CoNET DePIN Uniswap v4 Deployments
  • CoNET Decentralized Bridge
Powered by GitBook
On this page

Was this helpful?

Edit on GitHub
  1. Core Technology
  2. Wallet-to-Wallet encrypted network communication protocol
  3. Internet Protocol

Internet TCP/IP Communication Privacy Threats

Three major elements of communication: sender address, recipient address, and content

Last updated 1 year ago

Was this helpful?

Internet TCP/IP Address Privacy Problems

The TCP/IP package of the Internet communication protocol consists of header metadata including the source address, destination address, and content (data). Due to the widespread use of SSL encrypted communication recommended by , the threat of content (data) privacy leakage is greatly reduced.

Due to the header metadata being transmitted in clear text (unencrypted), personal information about users is leaked:

  1. Geographic location of communicating parties

  2. Software used to transmit the data

  3. Frequency of communication.

Due to ISPs requiring KYC, IANA can obtain a users identity with just the IP address, including the registered owner, and possibly even the current tenant.

Having access to this information makes the internet less open and free.

Packet data can be blocked by IP addresses, on both the sending and the receiving end, preventing users from connecting or making an outbound connections. This data leak can be abused by individual server hosts or even at the ISP level and it is all easily logged.

webhosts can block users by ip address, preventing specific users or blocking whole regions of users from making connections. In the same way out going communications can be blocked as well.

webhosts can deanonymize users that connect to their server

webhosts can block certain types of applications

  • Internet traffic can be filtered based on origin or destination IP address or domain, banning specific users or large groups of users

  • Block network communication of certain types of applications, such as Bitcoin or torrents

Technical measures that network monitors can take

  • Traffic filtering system based on destination IP address or domain name.

  • Obtain the current real geographical location of the monitored object

  • Obtain the social network of the monitored object.

  • Block network communication of a certain type of application software. Such as blocking the communication protocol of Bitcoin and Ethereum.

Internet application service providers exploit privacy

  • Obtain the visitor’s true identity.

  • Tailor-made advertising.

  • Identity-based denial of service.

  • Record and collect visitor data, combined with big data models, to obtain an accurate personal evaluation system. For example, a centralized artificial intelligence system can evaluate the user's cultural beliefs, knowledge reserves, living habits, IQ level, current happiness, anger, sorrow, and joy through big data analysis based on the accumulation of visitors' questions, and can predict the user's next step. hours, possible actions for the next week.

W3C