← Home

MaidSafe part III - Joining & anonymity

This post explains how MaidSafe’s network handles node joining and maintains anonymity, contrasting it with Tor/i2p approaches. The key difference is that IP addresses don’t traverse the network in MaidSafe.

Network Architecture

  • Uses a secured DHT implementation based on XOR networking
  • Two node types: Clients (passive data producers/consumers) and Vaults (routing infrastructure)
  • Both use unique 512-bit private IDs unlinked to public identities

    Connection Process

  • Nodes read from cached lists or fall back to hardcoded bootstrap nodes
  • Bootstrap nodes have IP:PORT and public keys
  • 100% encrypted communications from the first message

    Anonymity Mechanism

  • Clients connect to close nodes, requests are relayed with IP:PORT stripped
  • Data returns to anonymous ID through network hops
  • No IP:PORT notion in messages unless XOR-close to the node
  • Vault IDs are randomly assigned by the network, not chosen by users
  • Targeted attacks require millions of computers running correctly to potentially get close to a single node

    Security Features

  • All messages encrypted
  • Router compromise is irrelevant due to encryption
  • In-transit encryption and end-to-end identification at every hop