The Twilight Vision - Privacy for the Internet

I. Privacy on the Internet

Remember when going online was like stepping into a secret world? You could do whatever you wanted without anyone looking over your shoulder. Well, unfortunately, that was never the case.

The Internet was not designed with privacy in mind. As with any human endeavor, its weaknesses have been exploited to the fullest. From early threats like website sniffing and man-in-the-middle attacks to today's pervasive data collection and surveillance, our online activities have become a goldmine for hackers and corporations.

While HTTPS has significantly improved web security, it hasn't solved the fundamental problem of user surveillance. Cookies, DPI, and other tracking technologies have become ubiquitous, allowing websites, apps, and internet providers to collect vast amounts of personal data. This has led to a growing demand for privacy solutions, as evidenced by the introduction of GDPR, Apple's no-cookies policy, and 1.5B VPN users.

Unfortunately, existing solutions, like VPNs, have a single point of compromise due to their centralized architecture. Browsers and companies can detect when you're using one, which often results in constant CAPTCHAs, and sometimes, even basic access to websites is blocked.

Decentralized finances are not an exception as well. Blockchain RPC nodes usually have access to the user's IP address, device, and other metadata, which allows companies like Arkham to deanonymize wallet owners.

Many tech companies are developing solutions to address this problem. Can we anticipate something effective soon, or is it already here? Unfortunately, most efforts fall short for two key reasons:

  1. The solutions are often too focused on specific ecosystems, as seen with Apple and Dandelion

  2. They are overly complex and neglect user experience (Tor, P2P networks)

We need a universal, trustless solution to protect our privacy across the Internet ecosystem. A solution that doesn't sacrifice speed or convenience.


II. Introducing Twilight

Twilight is a DePIN privacy layer on Solana that will help users and companies make their traffic private and secure. We designed Twilight with three core principles:

  1. It must be universal, ensuring comprehensive network privacy across the Internet, blockchains, and applications. Our solution is compatible with any device or operating system, and we offer SDKs to other companies for seamless privacy integration into their apps.

  2. It must be trustless, achieved with our custom VLESS protocol version – VPPL. This Virtual Private Proxy Layer processes traffic without participants having full access to user data. Encrypted data moves through 2 nodes, with only the final node having the keys to decrypt the destination without knowing the sender's identity.

  3. It must be decentralized. The DePIN approach enables us to create a self-governed network that scales effortlessly to meet the growing demand for privacy solutions.

The two-node approach adds just 5 ms of latency to the average 3000ms page load time, while our proxy technology — outperforming traditional VPNs — delivers unmatched speed for end users.

While this approach addresses privacy concerns, it’s natural to question its economic viability for billions of users. The answer is clear: yes, it’s cost-effective. Just as HTTPS revolutionized the Internet when computational power became affordable, VPNs were once costly due to underdeveloped hardware. We're now at a point where bandwidth costs allow us to prioritize privacy without making sacrifices.


III. Thesis

A decade ago, HTTPS transformed the Internet by securing online traffic, marking a significant leap forward in web security. However, while it made our connections safer, it did not fully address the pervasive issue of user surveillance.

Today, with growing concerns about privacy and the limitations of existing solutions, we stand on the brink of a new shift. Twilight is set to be the next revolution, making Internet traffic not just secure but private. As the new foundational infrastructure of the Internet, we will lead the twilight of user surveillance.


Consider following us on X

Subscribe to Extype
Receive the latest updates directly to your inbox.
Mint this entry as an NFT to add it to your collection.
Verification
This entry has been permanently stored onchain and signed by its creator.