Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You can use WireGuard and our service hoppy.network to achieve the same thing! By having a static IP address exposed, you can switch from WiFi to ethernet or cellular without any network connections breaking. Probably not the best solution from an architectural standpoint, but certainly practical.


A VPS is much cheaper and the user is not reqired to trust a VPN-like service not to snoop traffic.

But it still does not solve the problem of adding a lot of latency.


If your threat model is based on your ISP not snooping on you then you need to improve your security…


Improve it by not having Internet connectivity I guess?

Even Tor is vulnerable to timing correlation attacks, imagine everything else, given how leaky most protocols are...


Parent is referring to end-to-end encryption, ie layer 7. However, as you point out, he is oversimplifying. Or perhaps underthinking.


> Parent is referring to end-to-end encryption, ie layer 7

Once my traffic is cleartext, a TCP connection to 209.216.230.240 is enough to infer I'm browsing this site.


This is a neat project. You're up against people setting up their own WireGuard exit nodes -- are these folks just not in your target audience?


It’s mostly people who need good IP reputation and a user friendly managed service. It’s hard to get clean IPs from massive cloud services.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: