Outernet

The outernet is an internet that is completely encrypted and private. Not only is tor used for end to end encryption of traffic, but even the information hosted is encrypted and web hosts do not know what information they are hosting.

The premise for this design is that "information is not a crime".

Idea for everyone has a site and socials that link to eachother but it uses standard internet and everyone self hosts [1].

Design

Outernet operates within the traditional internet just like cryptocurrency does. The design is composed of three types of users. Hosts, clients, and keymasters. The host hosts the encrypted content. Clients either view the content or upload it. Keymasters decrypt the content. Every user is known by a public key. Instead of clients knowing the IP address they want to connect to, instead they broadcast what they are looking for, either a public key of the host or even a query they are searching for. If a keymaster knows they have a decryption key for said website, they will offer the content to that user. Then the keymaster will send along the decryption key to another keymaster and the new keymaster will listen for new requests. Also the new keymaster sends a new OP address (which is a public key itself) to the public key of the web host as that new key is what they keymaster will sign for. One very important thing here is the host should not be able to search for their public key and have a keymaster decrypt their site. That would allow for censorship if the host could see what he was hosting. So the only one who should know what a hosts public address is hosting should be the current keymaster for the site and the clients, host, or even other keymasters (even ones that have decrypted the site in the past) should not be able to link content to which host it is on.

Hosts

The host would allow a certain signed public key to upload data to their server. This data is fully encrypted. The uploader can both read the data using a signed key, and also write using another key. Another read key that can read the data is made and given to key masters.

Key masters

Key masters hold decryption keys for certain websites. A key master only holds a key for one client request, then signs it to another (random) keymaster. This can be done privately in something like is done with CollectBit. So you might be able to see who was the keymaster last but that keymaster can no longer decrypt the message since that key was sent to someone else. Now when a key master decrypts the page for that one client they immediatly sign the key to someone(s) else. Now when that person signs the key to allow another client to view, it gets recorded in a distributed database or blockchain that they signed it and can not sign again. So what is happening is that by the time the network knows who can sign to decrypt, they have already signed and cannot sign again.

When the keymaster decrypts the site for the client, not onpy do they sign the key other kay master(s), the new recieving keymasters also assigns a new OP address to the host.

Clients

Clients use preferably end to end encrypted browsing sessions like Tor to access sites which the keymaster decrypts for them.

The client basically broadcasts to the network of key masters "I want to access OP (Outernet Protocol) address rt367rhckdo93urbdhe221gdjsklmc7e3562w". Then the keymaster who holds the key to view that makes a connection with the client and decrypts the site for them to browse. This connection time out's after say 10 minutes. In that time frame preferably the client would download the entire site for viewing.

OP addresses (Outernet Protocol)

Outernet protocol addresses are like IP addresses except they are temporary and change every time they are accessed.

Format

They are strings of base58 digits. Base 58 is taken from bitcoin as it is human readable characters. For now we will use 37 digits so no two randomly generated addresses will ever match. Really just as long as two aren't the same at the same time it is fine if they do collide.

Other pages that link to Outernet:

Attachments to Outernet:

Password to edit: nature