Clearnet

The Basics

When you use the Internet for things like news, email, social media, and even Haven, you are most likely using a clearnet connection. This means that all of your connections can be tracked, traced, and monitored by:

and even if you use HTTPSarrow-up-right or similar (which encrypts your transmission), your route is not hidden nor is it anonymous, thus; it is in the clear.

In-depth information

Since a traditional VPNarrow-up-right cannot save you from clearnet (as you are still using clearnet (though you are more proxied than without a VPN)), you should use an anonymous overlay network to avoid using clearnet directly:

These technologies protect you from clearnet by building an anonymous network over clearnet to keep your transmissions both encrypted and anonymous.

Here is an accurate, interactive diagramarrow-up-right provided by the EFFarrow-up-right which describes clearnet as it relates to Tor. The concept also (somewhat) applies to @Kovri and @I2P in terms of anonymity with the exception that:

  • @Kovri does not use exit nodes when connecting to an @eepsite

  • Your traffic never need to leave the @I2P network

  • You do not need HTTPS to use @Kovri (with the exception of @reseed)

Last updated

Was this helpful?