Event JSON
{
"id": "cf4dc70fb87097f66b30610ef2545c8d194bfc4cfafdd57ee887590eab131d93",
"pubkey": "32e1827635450ebb3c5a7d12c1f8e7b2b514439ac10a67eef3d9fd9c5c68e245",
"created_at": 1739372373,
"kind": 9802,
"tags": [
[
"r",
"https://obscura.net/blog/bootstrapping-trust/",
"source"
],
[
"comment",
"Why obscura is cool. It also tunnels wireguard traffic over quic so that it looks like regular web traffic, making it harder to block. QUIC uses TLS at the packet level to obscure (wireguard traffic is blocked on lots of networks just because its udp)"
]
],
"content": "The 1st hop only sees your connecting IP, but can’t decrypt your traffic. It forwards the still-encrypted traffic to the 2nd hop, effectively NAT-ing your connection and masking your IP address from the 2nd hop.\nThe 2nd (exit) hop connects you to the internet, but never sees your personal info or IP address since it only knows that the connection is coming from the 1st hop.\nThis splits “who you are” from “what you do”, meaning neither party can tie your identity to your browsing.",
"sig": "8e55267825e3130fc08f24f19951e042b7b86e68f5eff48cc5a3f8ba8853da6f9859dab262927d95bec9c1aeebe5fc233cdf3c6c0ac6f7b2305af6b9209ce212"
}