Issue of Ceno 2.0 Web Brauzer, using P2P network to bypass locks

Company equalite Published release of the mobile web browser ceno 2.0.0 (Censorship. No) intended for organizing access to information in conditions of censorship, filtering traffic or disconnecting Internet segments from the global network. The browser is built on the basis of the GechView engine (used in Firefox for Android), expanded by the possibility of data exchange through decentralized P2P network , in which users participate in the redirect traffic to external gateways that provide access to information bypassing filters. The projects of the project are distributed under the MIT license. Ready assemblies are available at google play .

p2p-functionality is included in a separate library uinet , which can be used to add censorship to arbitrary applications. The Ceno browser and the Ouinet library allow you to access information in the conditions of active blocking of proxy servers, VPNs, gateways and other centralized mechanisms for bypassing traffic filtering, up to complete disconnecting the Internet in censored areas (with complete blocking, content can be distributed from cache or local drives) .

The project uses content caching on the side of each user to maintain a decentralized cache of popular content. When the user is opened by the site, the uploaded contents are cached in the local system and becomes affordable to participants in the P2P network, who cannot get direct access to the resource or to the locks to circumvent blocking. On each device, only data directly requested from this device are stored. Identification of the pages located in the cache is carried out using the hash from the URL. All additional data related to the page, such as images, scripts and styles, are grouped and given together by one identifier.

To gain access to the new content, direct access to which is blocked, special proxy-goals (Injector) are used, which are located in the external parts of the network that are not subject to censorship. The information between the client and the gateway is encrypted using encryption based on open keys. Digital signatures are used to identify gateways and prevent the introduction of malicious gateways, and the keys of the gateways accompanied by the project are included in the supply of browser.

For access to the gateway, in the conditions of its lock it, a connection is supported through other users who act as a proxy for passing traffic to the gateway (the data is encrypted by the key key, which does not allow transit users through the systems of which the request is transmitted and wedged into the traffic or determine the contents). Client systems do not send external requests on behalf of other users, but either give data from the cache, or are used as a link to install the tunnel to a proxy-lock.

/Media reports cited above.