Cryptostorm VPN Unites White and Dark Webs, Supports Namecoin, Tor and I2P Domains

Published at: March 31, 2015

Cryptostorm, the VPN (virtual private network) service providers, revealed to Cointelegraph that they’ve been using Bitcoin and Namecoin to power their portal to the Darknet for months, announcing native access to Tor, I2P and .bit websites.

The company, also known as “Cstorm,” has been providing VPN services since 2006. In an interview with CT, they said they have been looking into blockchain technologies since 2012, around the time they began accepting Bitcoin as payment. During our conversation, they officially announced their native integration of Namecoin’s .bit domains into their services, alongside their tunnels to .onion and .i2p websites, which allows users to access the Dark Web as easily as typing a regular domain.

Indeed, the dream of a decentralized domain name system (DNS) has been part of the blockchain tech revolution since 2010, with pioneers like Aaron Swartz helping move it forward. From that dream was born Namecoin (NMC), which was intended to store and serve as a decentralized DNS in order to provide certainty that when you want to connect to funnycatpix.com, you are not secretly rerouted to the servers of funnydogsite instead.

In all seriousness, this kind of man-in-the-middle (MITM) attack is a big concern for security agencies and the companies that get spoofed, while also being a common means for stealing  passwords and other key information all over the net. This is one of the many security and privacy vulnerabilities within the White Web.

One of the problems with getting Namecoin’s awesomeness to mainstream use may be the need for users to install special browser extensions, modify their browsers, or run their own NMC node, since NMC does not quite fit the White Web DNS model. Dorkbot, the anonymous cryptographer of Cryptostorm, says getting everyone to run a NMC node “will never happen.”

Mike Ward, Namecoin evangelist and member of the OkTurtles foundation agrees, saying:

“I believe future growth in [top-level domains like .com or .org] will be blockchain based. It's not realistic to imagine every connected device running lightweight nodes for each chain, even if most TLDs live on a small number of chains.”

Cryptostorm seeks to solve this problem by using DNSchain, a blockchain agnostic, DNS-like system that connects users to IP addresses stored on the Bitcoin, NXT and Mincoin blockchains, among others. Cstorm allows access to Namecoin domains by connecting Cstorm’s own VPN infrastructure to DNSchain, so users won’t need to make special downloads or installations.

The most paranoid and arguably wise might raise concerns that Cryptostorm is centralized because it serves as intermediary between users and websites, thus they could themselves enable MITMs, just as domain name servers can today. Dorkbot said that this is a problem they are working on under code name DAfree, a project that Cointelegraph will be covering in more detail soon.

He pointed out that web browsers could triple-check IP addresses with other Namecoin or Bitcoin DNS-like services, such as Onename, Keybase or Okturtles’ DNSchain.

He also mentioned that Cryptostorm already follows a similar procedure, pointing to their public profile on Keybase that communicates with the Bitcoin blockchain, as well as a tweet from Okturtles to verify Cstorm’s use of their platform.

We think it’s great that there are cutting edge service providers out there like @cryptostorm_is experimenting with @DNSChain! ?

— okTurtles (@okTurtles) March 18, 2015

Finally, he suggested such users run their own instance of Okturtle’s DNSchain, saying:

“Their code is public. You can self-compile, and they code-sign via writes to the blockchain, so you can even verify source integrity that way."

Easy Access, No Questions Asked

Thanks to Cstorm, there’s no longer a need to download and install special browsers, full Namecoin clients nor browser extensions to access the Dark Web. Simply buy a monthly token for the cost of a Starbucks Venti Chai Creme Frappuccino, follow their installation guides and you are in.

They offer a painless install widget for Windows, along with Cryptofree, their free VPN service with 256kb download speed, which you can get running on your phone in minutes.

To provide optimal privacy and further disrupt contemporary VPN providers, Cstorm uses a “zero knowledge” model to sell its customers access to their network. They ask no questions. Just give them an email and send them some Bitcoin, and you’ll receive a cryptographic token that serves as a username on your VPN network manager. For a password, instructions on their forums say you can type, “Snowden rocks!” or whatever you’d like, just “type something.”

I personally bought mine on the web version of NXT’s FreeMarket from a trusted reseller and had it delivered through their messaging system, no email needed.

They have exit nodes all over the world, including but not limited to Iceland, Singapore, Paris, Central and Western United States, Montreal and London. 

Uhm … What Is a VPN?

VPNs mask your geographical location when surfing the web and they encrypt your traffic, allowing you to access websites all over the world. You can sail  under the radar of oppressive regimes such as The Great Firewall of China, or if you are so inclined, the Western copyright monopolies.

Wherever you stand on these complex issues of copyright versus piracy versus freedom of speech, you’ve probably run into a YouTube link on Facebook or Twitter that your friends around the globe were enjoying and discussing, but you could not watch. Why? Well, you were in the “wrong country.”

One neat thing VPNs can do is get you past these … constraints and straight into fresh foreign media, though they can do much more.

VPNs are routinely recommended by information security authorities, such as Kaspersky, as a way for professionals to protect against various kinds of corporate espionage. One example is Darkhotel, which the Russian Infosec called out late last year as an “advanced persistent threat” against business leaders traveling abroad and getting hacked during their internet sessions in luxury hotels.

The same goes for journalists, who depend on secure communications with sources and whistleblowers. And of course, post Snowden's revelations, some VPNs even claim to protect you against government spying.

However, there’s often the problem of honeypots, or fraudulent, vulnerable or compromised VPN service providers that claim to be utilizing cutting edge and secure services, but are not.  So how does one know?

What Does It Mean to Be “Secure”?

Well, according to Dorkbot, who goes by the name of Pattern_Juggled on their forums, “If your network security provider doesn't sound a bit paranoid and unhinged to you, then they are either ignorant or too lazy to care.” He adds:

“Cstorm exists to provide secure network service. Secure has several components, from protection of physical IP/geolocation status, to limiting risks of active surveillance attacks, to ensuring routing of network requests is done via the standard public internet process and is not fiddled selectively by outside parties. … Secure also means confidence that one is visiting the resource one expects to be visiting based on public data. Yahoo is yahoo, not yah00.com or a fake yahoo set up by GCHQ. 

"Finally, secure networking encompasses the ability to access 'meta-networks' like [.bit,] Tor and i2p with minimal risk of session subversion or mis-routing of one's traffic."

Here is their model for honeypot awareness and risk management.

For more details on their use of cryptography, degree of decentralization and an recent and excellent Q&A by an unnamed interviewer, check out this post.

Last but not least, Dorkbot mentioned that Cryptostorm is working on other related applications of the blockchain, and users can expect more to come. 

Did you enjoy this article? You may also be interested in reading these ones:

How the Government Is 'Hacking' Tor (Op-Ed) Blockchain.info Adds Additional Tor Security Features to Head Off Man-In-the-Middle Attacks Researcher Discovers Tor Is Vulnerable To Malware Binaries Inserted By Exit Nodes
Tags
Tor
Vpn
Dns
Related Posts
Fake Tor Browser Steals Bitcoin From Darknet Users, Warns ESET
Major antivirus software supplier ESET has discovered a trojanized Tor Browser designed to steal Bitcoin (BTC) from buyers in the darknet. Fake browser distributed via 2 websites Targeting users in Russia, the fake Tor Browser was distributed via two websites and has been stealing crypto from darknet shoppers by swapping the original crypto addresses since 2017, ESET’s editorial division WeLiveSecurity reported Oct. 18. Created back in 2014, the two fake Tor Browser websites — tor-browser[.]org and torproect[.]org — are mimicking the real website of the anonymous browser, torproject.org. According to the Slovakian software security firm, these websites display a message …
Bitcoin / Oct. 18, 2019
Darknet, cryptocurrency and two intersecting health crises
While the precise origin of the COVID-19 pandemic is unknown, it has infected more than 30 million people, with almost 1 million confirmed to have died from it as it continues to spread across the world. The highly contagious virus has the ability to survive up to three weeks in frozen food supplies of meat and fish, according to a study. Related: Illicit crypto transactions are getting more attention from the government The United States — the worst-hit country by sheer numbers — is now facing two intersecting health crises: The ongoing opioid overdose epidemic and the coronavirus pandemic with …
Technology / Sept. 27, 2020
Your Passwords Could Be For Sale on the Dark Web Right Now
A recent study revealed that over 15 billion credentials are in circulation via the dark web, representing a 300% increase since 2018. Available information ranges from network access credentials, banking login data, and even streaming services accounts from Netflix. According to research conducted by the cybersecurity firm Digital Shadows, part of the leaked data is even circulating for free. The report warns that the reason that so many account credentials are available online is that people are using non-complex passwords that can be easily brute-forced using hacking tools. Access to corporate networks as an open door for ransomware attacks Among …
Technology / July 10, 2020
Tor Project Now Accepts Bitcoin Over Lightning Network
The Tor Project, the nonprofit organization behind the anonymous network Tor, announced that it now accepts Bitcoin (BTC) donations via the Lightning Network. The organization announced on Nov. 19 that it will accept Lightning Network donations as part of Bitcoin Tuesday, a fundraising initiative led by the crypto-for-charity organization The Giving Block. Tor recommended the BottlePay wallet for donations, which allows users to search for The Tor Project inside it and send crypto without copying and pasting addresses. The Lightning Network is a layer-2 payment protocol for the Bitcoin network that aims to expedite payments and address the network’s scalability …
Bitcoin / Nov. 20, 2019
Cross-chains in the crosshairs: Hacks call for better defense mechanisms
2022 has been a lucrative year for hackers preying on the nascent Web3 and decentralized finance (DeFi) spaces, with more than $2 billion worth of cryptocurrency fleeced in several high-profile hacks to date. Cross-chain protocols have been particularly hard hit, with Axie Infinity’s $650 million Ronin Bridge hack accounting for a significant portion of stolen funds this year. The pillaging continued into the second half of 2022 as cross-chain platform Nomad saw $190 million drained from wallets. The Solana ecosystem was the next target, with hackers gaining access to private keys of some 8000 wallets that resulted in $5 million …
Blockchain / Aug. 11, 2022