Veilid - The Next Generation of Tor?

40,378
27
Published 2023-09-05
Blackhat 31 was 3 weeks ago in Las Vegas, as always many new idea surfaced and major announcements for new software solutions.

Out of Cult of the Dead Cow comes Veilid, a Next Generation Privacy and Anti-Censorship Applications Framework based on Rust.

By request of a viewer, I am looking into this software stack, and here are the details I found, from their Blackhat presentation and from the documentation which is rapidly being churned out on their website.

AI Artwork: Long Horn Steer Skull in the West Texas plains (which is home to the CDC)

Links for this video:

Web: www.veilid.com/
Twitter: ‪@veiledlandminecraftnetwork1886‬
Mastodon: ‪@veiledlandminecraftnetwork1886‬
Discord: veilid.com/discord
GitLab: gitlab.com/veilid

Chapters
00:00 - Start
01:52 - What's wrong with Tor?
05:06 - What is Veilid?
05:39 - Veilid Application Framework
06:40 - Encryption
09:53 - Storage
11:43 - Routing
14:55 - Summary
16:05 - How You Can Help
16:57 - Mu Thoughts
17:44 - Thank you!

Gear I used to make these videos

Hardware
Mac Mini M1 - amzn.to/3NDQj9F
Lenovo Thinkpad X1 Extreme (Daily Driver Linux) - amzn.to/3PkSYpK
AMD Rysen Machine (Currently Unplugged)
Khadas VIM 3 - amzn.to/3NjJmt3
NVIDIA Jetson Orin Nano - amzn.to/3NcLpyZ
Odroid N2+
Raspberry Pi 4
Intel Nuc 10 - amzn.to/46e6l15
Intel Nuc 12 - amzn.to/3NCYxPj

Network
Aruba Instant On 1930 24-Port Gb Ethernet - amzn.to/46e6l15

Video Equipment
Panasonic GH6 Camera - amzn.to/3PoUKX1
Panasonic GH4 Camera
Blackmagic Design ATEM Extreme Pro ISO - amzn.to/3Pkma08
Blackmagic Design Hyperdeck Studio HD Mini - amzn.to/42JY5mt
Blackmagic Design Hyperdeck Shuttle - amzn.to/42Tdzoi
Blackmagic Design Cloud Pod - amzn.to/3qW14va

Audio Equipment
Shure SM7b - amzn.to/3qQ7Qm7
Universal Volt 276 - amzn.to/3Nfe9He

Software
Rogue Amoeba Audio Hijack 3
Rogue Ameoba Loopback
Blackmagic Design Davinci Studio 18 - amzn.to/43ZjPMm

Support me on Patreon: www.patreon.com/DJWare
Follow me:
Twitter @djware55
Facebook:www.facebook.com/don.ware.7758

Gitlab: gitlab.com/djware27

#cultofdeadcow #veilid #blackhat

All Comments (21)
  • @katelynbowden1
    As one of the creators of Veilid, I really enjoyed and appreciated this video!! You did a great job going over some of the features and tech we are using. One thing to add- IPFS and TOR are not user friendly, and neither is adopted by folks outside of tech. One thing we are reaching for with Veilid is to make it accessible for all users, whether or not they’re tech literate. Anyway, thank you again for covering Veilid, and I hope some of your folks join in to help us give privacy to EVERYONE :)
  • @eriksiers
    It's amazing that cDc is still around. I haven't given them much thought since they released Back Orifice 2000.
  • @CyberGizmo
    Correction: In this video I had a typo which carried through due to the magic of copy / paste it is not ISPF the Inter Planetary File System should be IPFS
  • @brianchandler3346
    Go cDc! Man, talk about a nostalgic surprise this morning over coffee. Seeing them still around and at it makes me smile from ear to ear. Best memories of my childhood (BBS years). 🤓🖥️📞🐄🛸👾😆
  • @paulforester6996
    The first time I heard of cDc was in high school in the 1980's. I just wish I had a computer at the time to learn more about them. Looked up things later. I wish those people well.
  • @jickjackyou
    While Tor can be "slow" it doesn't sound like you fully understand how Tor works. Tor does take care of routing automatically in it's 'default' mode, but you can pick the entry node. That's what bridges are for. It gets you around the problem of networks and even countries censoring Tor by blocking public nodes.
  • @ehrichweiss
    I followed CDC in their early days and have really been impressed with how far they've come all these years.
  • @lemagreengreen
    Tor seems very fast these days which is a warning sign in itself, it's broken if there's significant resources being provided to it.
  • @sobored776
    Bridges and normal nodes (non-exit nodes) work exactly the same (protocol and implementation). So you can set every Tor node as your guard ("entrance", this isn't a seperate kind of node like you say at 11:55) by manually setting it as bridge in the connection settings. The difference is that bridges don't get listed publicly so they can't be censored on mass scale by e.g. foreign governments. I assume you sould only do that with nodes who have the guard flag so others use them as guard, too. That can be checked on Tor Metrics. So check some trusted privacy organizations or local hacker communities if they run a Tor node and if they got the guard flag and add them as bridge(s). Or even run your own!
  • @NeuroScientician
    the shrinking packet size closer it gets to target might be an issue, allows attackers to estimate how many hops are from the target.
  • @blaiseutube
    I'm a big fan of self hosting and I will look into veilid, thank you!
  • @AlanDampog
    very interesting! checking out Veilid.... thanks for the video, subscribed.
  • @Chris-op7yt
    it's not the protocols that's the problem; it's that the internet became owned by a handful of companies. users flocked to these mega social networks. it's pointless having extra privacy/encryption, when you willingly sign up to services, telling them which devices can be used for the services.
  • @jakemeyer8188
    Man...I haven't followed the cDc since the mid 90's. I'm getting a nostalgia wave just hearing the name again.
  • @johnlinley2702
    Interesting review. I had no idea this development was underway. Thanks for the good review.
  • @LabworksVapes
    Now I am intrigued - Thank you for the heads up Don
  • @jsalsman
    Cautiously hopeful! One question is will it work from China without an identifiable (commercial) VPN?
  • @jayd8935
    The ability of the B side to pick the entire return route seems unusual.