Haven Protocol
  • Haven Protocol
  • 💻GUI
    • Overview
      • Restore Account
      • Create Account
      • Login
      • Transfer
      • Receive
      • Offshore Exchange
      • Onshore Exchange
      • Nodes
      • Settings
      • Troubleshooting
      • Signature
      • Smart Mining
  • CLI
    • Overview
      • Installation
      • Create Account
      • Restore Account
      • Login
      • Transfer
      • Receive
      • Offshore Exchange
      • Onshore Exchange
      • Nodes
      • Troubleshooting
      • Settings
  • RPC
    • Overview
      • Transfer
      • Transfer Split
      • Offshore
      • Onshore
      • Offshore Transfer
      • Offshore Sweep All
      • Get Offshore Balance
      • Get Transfers
  • FAQ
    • Project Timeline
    • The Protocol
      • What is Haven?
        • What can Haven be used for?
        • How does it work?
          • Transactions
            • What are the transaction fees?
            • How do the transactions work?
          • Haven Assets
            • Can I see the supply of xAssets?
            • What is the supply of XHV and xAssets?
            • How many xAssets will there be?
      • Whats an Oracle?
      • Is Haven private?
        • Why does Haven need privacy?
  • Glossary
  • Overview
    • Airgap
    • Address
    • Address Book
    • Account
    • Atomic Units
    • Block
    • Blockchain
    • Bootstrap Node
    • Bulletproofs
    • Canonically Unique Host
    • Change
    • Clearnet
    • Coinbase
    • Consensus
    • Cryptocurrency
    • Daemon
    • Denomination
    • Destination
    • Encryption
    • Fluffy Blocks
    • Fungibility
    • Kovri
    • Locally Unique Host
    • Mining
    • Mnemonic Seed
    • Node
    • Open Alias
    • Paper Wallet
    • Payment ID's
    • Pedersen Commitments
    • Pruning
    • Random X
    • Remote Node
    • Ring Size
    • RingCT
    • Ring Signatures
    • Scalability
    • Spend Key
    • Stealth Addresses
    • Tail Emission
    • Transactions
    • Unlock Time
    • View Key
    • Wallet
Powered by GitBook
On this page

Was this helpful?

  1. Overview

Clearnet

PreviousChangeNextCoinbase

Last updated 4 years ago

Was this helpful?

The Basics

When you use the Internet for things like news, email, social media, and even Haven, you are most likely using a clearnet connection. This means that all of your connections can be tracked, traced, and monitored by:

  • your

  • the website/service/person you're communicating with

  • possibly a capable entity

and even if you use or similar (which encrypts your transmission), your route is not hidden nor is it anonymous, thus; it is in the clear.

In-depth information

Since a traditional cannot save you from clearnet (as you are still using clearnet (though you are more proxied than without a VPN)), you should use an anonymous overlay network to avoid using clearnet directly:

  • @Kovri

  • @Java-I2P

These technologies protect you from clearnet by building an anonymous network over clearnet to keep your transmissions both encrypted and anonymous.

Here is an accurate, provided by the which describes clearnet as it relates to Tor. The concept also (somewhat) applies to @Kovri and @I2P in terms of anonymity with the exception that:

  • @Kovri does not use exit nodes when connecting to an @eepsite

  • Your traffic never need to leave the @I2P network

  • You do not need HTTPS to use @Kovri (with the exception of @reseed)

ISP
Five Eyes
HTTPS
VPN
Tor
interactive diagram
EFF