What is a dDVPN?
The Decentralized Domain Virtual Private Network (dDVPN) is the next generation VPN which we use to support the new internet foundation for communications. The dDVPN provides users a secure method to access online content while in control of all of the end-to-end data coming from users online without the information being intercepted from others trying to get your data.
d- (decentralized) platform where a single entity does no own control of the data crossing the VPN or connection end points.
D-(Domain) Network address for each individualized website.
VPN-(Virtual Private Network) encryption to provide secured remote access over the internet.
The New Internet is built on top of dDVPNs.
How is a dDVPN more secure than a VPN and dVPN?
Flow chart of a current user using a regular browser with no VPN usage.
Flow chart of a current user using VPN/dVPN to buy Bitcoin through Coinbase.
VPN — Data is encrypted from User to VPN connection. However, there’s still vulnerabilities using regular browsers from the VPN connection to the coinbase website that can still be intercepted. Furthermore, third-party VPNs decrypt the data and can potentially be a ‘man-in-the-middle’ attack.
dVPN — Data is encrypted from User to the dVPN. They share the same challenges as a VPN connection. Even more, anyone can own a dVPN — government agencies, hackers, or your neighbor.
The New Internet’s dDVPN is the most secured internet browser that provides an end-to-end encryption. Unlike the current dVPN infrastructure models that allow any user or entity to buy and become a participant in a dVPN, TNI platform limits the purchase of nodes to only domain owners. This ensures that network nodes are not owned or used by bad actors (hackers, government agencies, etc.), and that each decentralized domain virtual private network (dDVPN) node is customized and configured for every participating server domain. User traffic is encrypted from a user’s browser to the correct domain a user wants to visit — instead of a random VPN end point which may or may not have a man-in-the-middle problem.
Note: Domain users are NOT required to purchase a TNI dDVPN node. This decentralized method provides domain name owners the ability to purchase a node elsewhere and have full discretion where they decide to secure the data when their users, customers, and employees provides information directly to them.
Here’s the summary:
Why should I care?
Keeping personal information private is important. Otherwise, users are vulnerable to tracking, malware, ransomware, and privacy/security issues and are prone to identity theft, stalking, and stolen information.
What other security features does dDVPN provide to users on The New Internet?
TNI Web Browser routes all data traffic through this dDVPN tunneling protocol that cycles a randomized encryption algorithm. If any data is decrypted, it is cycled into a new encryption. As a result, a third-party is unable to track, profile, spy on, or locate a user’s data from the browser in real time as it would require a new signature file to read the decrypted traffic thus by constantly changing our library, this prevents potential hackers from decrypting TNI as it will require a new Signature file everytime our algorithms change. We also change the SSL protocol so hackers cannot interpret the SSL traffic correctly — which adds an additional layer of protection.
Furthermore, TNI dDVPN nodes owned by each verified domain owner have the same cycling encryption so that all data traffic is secured from end-to-end. The tunneling protocol routes data traffic to computer “nodes” that make up the decentralized Domain Virtual Private Network.
To join the most secured network: https://www.thenewinternet.com