Comment by dongcarl
Carl from Obscura here
Happy to answer any questions y’all might have!
Carl from Obscura here
Happy to answer any questions y’all might have!
(Carl from Obscura here)
1) Here's what [one of our FAQ entries](https://obscura.net/#faq-trust) say:
> Additionally, our app displays your current exit hop’s WireGuard public key on its “Location” page. You can check this key against what Mullvad publishes [here](https://mullvad.net/servers) to ensure that you’re connected via a genuine Mullvad exit hop!
2) I really hope that the VPN industry comes together and become each others' 1st/exit hops!
3) Not totally sure what you mean, but we [use WireGuard-over-QUIC](https://obscura.net/blog/bootstrapping-trust/).
Thanks. I do wonder why you are a mac only app.
Mac apps by default ping the apple servers before they can connect to wireguard over quic and what not.
So its definitely not as secure as using linux or bsd.
Please I want to understand what makes linux / cross platform development harder.
It was for zeditor , arc browser and what not. Things make me treat as third class citizen and mac users as first kind of feels a little .. weird.
Multiple questions here :
1)How can I trust that you are sending the data to mullvad only , is there some way of proving this instead of trusting you ?
2) What if all the VPN companies merge together to create such network with 2-3 hops yet still having maximum privacy.
3)Off-topic? But couldn't this theoretically be done if lets say the mullvad vpn connects via https to something like piping server but instead of a single write -> multiple reciever , we fork it a little bit for multiple write -> single receiver & this can work itself on curl and its encrypted. I can in my rough mind draw exactly what obscura is trying to do but with piping server which is so much easier to self host & even host it on multiple cloud providers. Though a big thing is that the nodes would have to be a little configured for this specific purpose (maybe this is where obscura can come in?)
Supposing that this can be done , then what threat model difference would have it as compared to current obscura. https://github.com/nwtgck/piping-server