Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You could technically set up your own completely separate network -- everything you need is there. You'd just have to fork it. It'd be kind of like forking Bitcoin to make Dogecoin or JuggaloCoin or whatever. But in this case I wouldn't see the point. You wouldn't be able to join networks on the "real" network, etc.

Compared to I2P and Tor: it's neither of those. This is about network virtualization and making it easy to set up ad-hoc networks across physical boundaries. It's not a privacy tool per se, though it is end-to-end encrypted so the content of your data is hidden. My goal isn't to duplicate the work of Tor or I2P-- if you want strong anonymity, use those. (You could use ZeroTier One through Tor, though it would be slow.)

There is an incomplete beginning to a technical FAQ here that answers some of these questions in more detail:

https://github.com/zerotier/ZeroTierOne/wiki/Technical-FAQ



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: