MASQ Network
Download MASQ Nowmasqbrowser.com
  • 🌐MASQ Network
    • What is MASQ Network?
    • Official Links 🔗
    • FAQ
    • MASQ Comparison 🆚
  • 🔷MASQ Token
    • Token Economy
    • Bridge to Base
    • Contract Addresses
  • 💻MASQ Web3 Privacy Browser
    • Install Requirements
      • tMASQ Testnet Tokens
      • Using Installer files on MacOS/Linux
      • System Cleanup
    • MASQ Browser FAQs (Testnet)
    • Updating MASQ web3 Browser
      • Breaking Change Releases
      • Over-the-Air Updating
    • Providing Feedback
    • Troubleshooting
      • Checking MASQ Browser Version
      • Port 53 Problems (common to Windows)
      • Port 80 (common to Windows)
      • MacOS User Startup Issue
  • 🖱️MASQ Extension App
  • 📑Core Concepts
    • Mesh Network (dMeshVPN)
    • MASQ Neighborhoods
      • MASQ "Suburbs"
    • Gossip Protocol
    • CORES Packages
      • Life of a CORES Package
    • Encryption Methods
    • Clandestine Routing
  • 👨‍💻Advanced Use
    • MASQ Node from CLI
      • Configuration Methods
      • masq Interface
      • MASQ Daemon Commands
      • Configuring MASQ Node
      • MASQ Node CLI FAQ
    • CLI Startup Guides
      • MASQ CLI - Windows
      • MASQ CLI - Linux
    • Setting MASQ Wallets
    • Blockchain Service Endpoint
    • Port Forwarding
    • Compiling MASQ Node
    • Common Challenges
      • Firewall Exceptions
      • Port 53 Problems? (usually in Windows)
      • User permissions --real-user
  • 📦Resources
    • GitHub
    • X/Twitter
    • Telegram
    • Discord
    • Blog
  • Legal
    • Disclaimer
    • Privacy Policy
Powered by GitBook
On this page
  1. Core Concepts

Clandestine Routing

PreviousEncryption MethodsNextAdvanced Use

Last updated 1 year ago

As MASQ Network grows publicly, eventually there will be external forces who will want to intercept traffic or prevent the network from being utilized in the way it was intended - essentially attempt to censor or infiltrate the network itself

To operate in a way that allows the MASQ CORES packages to be routed with another security layer, will be wrapped in a 'mask' - in some ways this will resemble 'onion routing'

The first mask is basic seen today and they provide additional layers of security similar to typical HTTPS traffic we see today.

Long term development goals are on the ultimate security goal of creating Clandestine routes for CORES packages in the MASQ Network. In this type of route, each CORES package will be wrapped in a further layer of obscurity that will resemble different types of web traffic (not just HTTPS). Because traffic patterns viewed over time can be distinguishable (by methods such as Deep Packet Inspection) masking packages in random traffic patterns can deter typical packet sniffing and network traffic analyzation methods. This will prevent patterns from emerging and having requests and responses blocked against the users.

This entire layer will wrap around CORES packages and its various components before being handed off to other peers on the routing path.

📑
CORES packages
Encryption Methods