The Problem of the Internet’s Open Infrastructure and Ways to Resolve It

The Oracle of Liberty
4 min readFeb 10, 2021

Any way you look at it, the Internet is an “open space.” It is a great tool for global communication, free access to data, etc. That is a positive side. However, if one considers the concept of ‘openness’ of the Internet in greater detail, they will certainly discover its negative side as well.

What is the open infrastructure of the World Wide Web? Providers serve their customers by providing local communications between devices within the network, as well as communications with other similar networks. This structure implies that each provider or client has their address from the geographical standpoint. And this is a direct threat to privacy because their data can be lost and stolen.

The problem is aggravated by the fact that existing security tools and methods are not comprehensive but a related solution. In other words, the appropriate level of data security is only possible once the current approach to infrastructure changes. Refinement and improvement do not help.

Threats to privacy of the Internet users due to the open infrastructure include:

  • Unscrupulous online users hack and easily access user data, use personal data for illegal activities, both online and offline, including deception, blackmail, extortion, and spam.
  • Support personnel employed by the Internet providers have unhampered access to personal information of online users. Laws of most countries prohibit the use of data in such cases directly, but the fact remains: Third parties are able to see a client’s connection with their addressees. It doesn’t matter whether it happens inside or outside of the Internet provider’s network. For example, this poses a serious threat to financial transactions.
  • Almost all of the Internet services and functions have multiple entry points. If these points are locked functionality is broken.

The list goes on but we highlighted the most obvious points of weakness.

What could be the solution? It is impossible to change the Internet. Yet we are observing emerging approaches to solving the open infrastructure problem ‘from the outside.’ They do not propose changes but rather provide new space for interaction.

TOR browser and TOR network are widely known. TOR offers an alternative to commonly used browsers ensuring user anonymity on the Internet. Its key objective is to hide a user from possible hacker attacks, government action or intrusive online advertising. The principle of operation is that anonymization of the data transmitted and the user’s geography are entirely encrypted and transmitted through random servers to their point(s) of destination.

Another example is i2p. It is a new and secure internet operating on top of the existing Internet. Specifically we are talking about i2p data protocol that is used on top of the conventional TCP/IP. It ensures user anonymity, while its key functionality is to conceal IP addresses of servers running websites, avoid centralized storage of domain information, and encrypt transmitted data packets. Distributed data transmission implies that a user sending their data ‘places’ it inside a large packet, then their recipient gets the packet, takes out the content, and transfers the remaining bits and pieces of data inside the packet to other recipients.

Some solutions go further and take into account the bigger picture. How about developing a dedicated anonymous ecosystem? A good example is TheOoL (“The Oracle of Liberty”).

TheOoL is designed as a super secure information ecosystem that provides users with personal online workspace and high speed cloud services for secure distributed computing. As an example, a user is able to make transactions without leaving their personal ‘digital footprint’ on the Internet. User data cannot be collected and third party information (unsolicited advertising, spam, etc.) is blocked.

User data security is guaranteed thanks to distributed data storage whereby exact location of data can’t be traced as there is no specific place of storage of the data. Data is stored in a ‘chaotic’ and distributed way and only the data owner is able to ‘put the pieces together.’ Hacker attacks on specific nodes are no longer possible because the ‘point of attack’ may not be identified.

Data security is further enhanced by way of using dual encryption technology and embedded blocking of data collection.

This solution is underpinned by blockchain technology. It is noteworthy that TheOoL also offers an embedded payment system based on its distributed financial register and an algorithm for cash flow interruption.

A solution of this sort aims to change the existing ‘rules of the game’ instead of patching the problem. It stands a chance of becoming the solution of choice for those who value privacy and anonymity of their personal data.

--

--