How would you describe Veiled?
No. The only thing that is really required for the darknet is to have someone have a PHP file on a Web server somewhere. As soon as you have that, you can build up a darknet just around that one node or you could chain that node to another node if you prefer to use a server you trust. Can you set login credentials to protect the node?
It's basically just a normal website. If you want to password protect it, we're going to build in some features into our darknet to discourage people who essentially shouldn't have access to your darknet. How does it mask an IP address and give a person true anonymity?
You really can't hide your IP address with the first connection you make, so hopefully you're connecting to somewhere that you trust. As soon as you are connected to that server, the rest of the darknet from that server will never see your IP address. None of the information that identifies you is used within the darknet. Literally there's only one point that actually knows your true IP address. That's in contrast to things like Tor, because in Tor, you still have to connect to the beginning node, but really the anonymity from Tor comes from the fact that you make the request, it goes into the Tor network and then comes out at some exit node that you don't control. Somewhere in the chain you've got to trust somebody.
What kind of interesting applications can you put on top of Veiled?
There are a lot of uses. Think about a suggestion box. You don't want someone logging who made certain suggestions. Another simple use case is just an anonymous forum that only exists in the darknet. You can communicate between a whole bunch of people inside the darknet and you could make it look like a typical Internet forum. Doesn't this have the potential to be abused by cybercriminals?
Whether you are a good guy or a bad guy, it's really important to maintain your privacy. As soon as you put something on the net, it has the potential to be out there forever. Whether people's intentions are good or bad that's not really for us to decide. We really want to put this technology out there and see what people can do with it and let people leverage it and let them make really good applications that work on top of the darknet. What are the limitations of Veiled?