A suite of network protocol implementations that sum to create an anonymizing reverse proxy dedicated to dissociating a user's true identity from their online content choices.
Thus far, the onus is overwhelmingly placed on end users of the internet to achieve anonymity online which limits scalability (think using Tor, installing a VPN, etc.). There are, however, niche circumstances where user anonymity is desirable and / or necessary. Unfortunately, frictionless solutions using the browser as a platform for end-to-end encryption (think Proton Mail) are easily compromised because of problems associated with trust in the standard client / server model . A market opportunity is available, thus, in the online microservice ecosystem to provide frictionless anonymity services to a company’s end users. In addition to exploring this opportunity, Layer 8 also serves simultaneously as an R&D foundation for future MAIC projects.
Realize a complex production system using modern, but already available, technologies to produce a novel microservice. In other words, successfully applied secondary, but not primary, research and development. For example, greenfield implementations of vetted cryptographic primitives in web assembly language.
Layer 8 is designed to be a scalable internet service platform that enables end-to-end encryption via the browser. This, in turn, enables a user’s true identity to be stripped from their content choices. Very broadly, the proof-of-concept, works as follows:
To succeed, Layer 8 must solve the fundamental problem(s) associated with trusting an unknown server to deliver an uncompromised application to the client with every new page load (see Kobeissi, N. (2021) An Analysis of the ProtonMail Cryptographic Architecture. Retrieved from https://eprint.iacr.org/2018/1121.pdf). To users, it will provide a free, anonymizing, authentication service.
Layer 8 must be open source so that it can be vetted by the larger internet security community. Crowd scrutiny will be fundamental to establishing its brand identity as a viable, trusted, third party. It should be noted that, technologically, it is already possible to build Layer 8. In fact, the working proof of concept that I wrote using Type Script is available on Github (github.com/satsite13/Layer8.git). Risky primary research and development should not be necessary to realize the project and will be avoided.