Mixnet.svg

Mixnet

Nym's Noise-Generating Mixnet (NGM) shields not only IP addresses, but also traffic patterns across the network. It can be integrated to any blockchain, wallet, or app to provide true anonymity for users.

Stopping surveillance in its tracks

With the AI technology now being deployed by surveillance systems worldwide, no other existing network can guarantee the privacy and anonymity of our data. Every centralized VPNs is structurally inadequate, and even decentralized networks like Tor are vulnerable. By adding noise to the decentralized network, Nym's NGM can protect users not only against current surveillance systems, but also against the AI-powered threats of the future.

Added Network Noise

Noise

Cover traffic.svg

Cover traffic

Empty data packets are introduced into the network to increase the anonymity of all users. These dummy packets look just like real ones.

Noise

Data-mixing.svg

Traffic mixing

Anonymized data packets from different users are shuffled together by mix nodes to obscure patterns of communication across the network.

Noise

Timing obfuscations.svg

Timing obfuscation

Data mixing prevents surveillance from tracking your packets based on the timing of when they arrive on and leave a server.

Nym protects network traffic in transit.svg

Nym protects network traffic in transit

Packets are encrypted in several layers and relayed through a multi-layered network called a mixnet. In each layer of the mixnet, mix nodes mix your internet traffic with that of other users, making communications private and protecting not just your content but your metadata (your IP address, who you talk to, when, where, from what device and more)

Nym is incentivized and decentralized.svg

Nym is incentivized and decentralized

Users pay a fee in NYM to send their data through the mixnet. By pledging an initial bond of NYM, anyone can run a mix node. Node operators are rewarded in NYM tokens based on reputation measured in staked NYM tokens and their quality of service (uptime and packets dropped) providing privacy for the end users. This is called ‘proof of mixing,’ similar to how Bitcoin rewards miners for mining new blocks. The reward mechanism enables the mixnet to scale and remain decentralised and economically sustainable.

Nym can work with any chain or application.svg

Nym can work with any chain or application

From Bitcoin to ZCash, no current “layer 1” blockchain provides “layer 0 privacy” for the peer-to-peer broadcasts used in crypto transactions. Nym can provide network-level privacy for any blockchain and other generic applications. From Bitcoin to instant messaging, developers can build their applications on top of Nym, offering powerful network-layer and metadata protections for the people and organisations using their services.

Learn more

VPN-1.svg

Nym is more than a VPN

The first app that protects you from AI surveillance thanks to a noise-generating mixnet

7 mins read
Network-1.svg

What is a mixnet? Unparalleled online privacy with a VPN

Learn how a mixnet works and how it can power the world's most private VPN

11 mins read
NymWorld-1.svg

Step-by-step guide to the Anonymous Mode

How the Nym mixnet works to protect your traffic

13 mins read
Privacy-1.svg

Why nymVPN Anonymous Mode provides the best privacy

Appreciating the value of technologically enhanced VPN privacy

8 mins read

FAQ

VPNs (Virtual Private Networks) are currently the most popular network-level privacy solution. A VPN provides protection via an encrypted tunnel between a user’s computer and a server run by the VPN provider.

One problem with many VPNs is configuration: misconfigurations in the software of clients can lead to sensitive data leaks or cyber attacks. But even when configured correctly, traditional VPNs don’t offer real privacy or adequate resistance to surveillance and censorship. This is because they are centralized: all your data passes through server(s) owned and operated by a single company. This makes user data vulnerable to server breaches, syber attacks, and overreaching government subpoenas. It also makes surveillance of the network extremely easy to accomplish.

VPN providers themselves can also fully observe all network traffic between users and the public internet, knowing exactly which services its users are accessing at a given time. The user must thus trust that the VPN provider is not using their information in a malicious manner or keeping logs.

The Nym mixnet is an anonymous overlay network that provides strong network-level anonymity, even in the face of powerful systems capable of passively monitoring the entire network. The Nym mixnet is decentralized, with no trusted third parties, and so does not require a trusted provider like a VPN.

Tor provides better privacy than centralized VPNs. The Tor network solves the network layer surveillance problem by routing onion encrypted traffic through a "circuit" of three relays so that only the final Tor node can see the destination. However, Tor’s anonymity properties can be defeated by an entity like an intelligence agency that is capable of monitoring the "entry" and "exit" nodes of the entire network. Tor’s design is expected to continue to be the best network layer privacy solution for web-browsing and other stream-based traffic.

Mixnets have higher latency but provide stronger network layer privacy properties, defending also against a global passive adversary capable of monitoring the entire network. By adding network noise (cover traffic, data mixing, and timing obfuscations), traffic patterns are obscured, protecting against any attempt at correlating flows and deanonymizing users.

Nym can provide more powerful network-level privacy for cryptocurrency transactions, e-mail, instant messaging, and any other message-based traffic. Unlike Tor, Nym’s mixnet design guarantees network anonymity and resistance to surveillance, even in the face of adversaries capable of monitoring the entire network, by adding noise to the network. Rather than operated by a trusted provider like a VPN, the Nym Noise Generating Mixnet is decentralized, using blockchain technology and token economics to organize the topology of the network. Nym node operators are incentivized to run nodes and provide good quality of service and uptime. Software updates are governed through community adoption as decisions are made by the node operators and token holders.

VPN-screen.svg

INTRODUCING NYMVPN

Advanced privacy built for the age of AI

Artboard 1.svg