Loving that lead paragraph.

  • juni@skein.city
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    This is precisely it, and is a similar approach to the ones used by other anonymization networks as well. This allows your entry node to know your node/IP is using the network, but with a secure end-to-end tunnel, nobody along that tunnel knows the entire source -> destination path or data, so it is usually considered sufficiently anonymous and secure.