<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Extype</title>
        <link>https://paragraph.com/@extype</link>
        <description>CEO at Twilight • Building DePIN privacy layer</description>
        <lastBuildDate>Fri, 03 Apr 2026 20:38:22 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>Extype</title>
            <url>https://storage.googleapis.com/papyrus_images/e48e3a061a365589c7eaac79fbf7c510432b814158e68d6e80f6f9a8ea9859c1.png</url>
            <link>https://paragraph.com/@extype</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[Twilight: Redefining Privacy with Decentralization]]></title>
            <link>https://paragraph.com/@extype/twilight-redefining-privacy-with-decentralization</link>
            <guid>jnBuEYQOSgP4Y9wzVTN3</guid>
            <pubDate>Fri, 30 Aug 2024 20:20:03 GMT</pubDate>
            <description><![CDATA[Over the past two decades, our personal and financial lives significantly shifted online, raising concerns around privacy. While solutions like SSL and HTTPS provide some level of protection, they fall short in guarding against mass surveillance by corporations, internet service providers, and malicious actors. Despite the efforts of many companies, true privacy will require a fundamental shift in the solutions we use.Why Existing Solutions Fall ShortExisting tools such as VPNs, proxies, and ...]]></description>
            <content:encoded><![CDATA[<p>Over the past two decades, our personal and financial lives significantly shifted online, raising concerns around privacy. While solutions like SSL and HTTPS provide some level of protection, they fall short in guarding against mass surveillance by corporations, internet service providers, and malicious actors.</p><p>Despite the efforts of many companies, true privacy will require a fundamental shift in the solutions we use.</p><h2 id="h-why-existing-solutions-fall-short" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Why Existing Solutions Fall Short</strong></h2><p>Existing tools such as VPNs, proxies, and Tor suffer from various limitations. While VPNs were initially created for internal network security and have since been repurposed, they still lack optimization for global accessibility. Additionally, VPN traffic is easily recognizable and blockable by DPI (deep packet inspection) analyzers. Proxies share a weakness with VPNs as they create a single point of vulnerability where the server possesses both user and destination information.</p><p>Tor network, known for its Onion routing that encrypts and directs traffic through multiple nodes, offers robust anonymity. However, its complex setup and slower speeds make it unfit for mass adoption. Moreover, Tor&apos;s dependency on volunteer nodes limits its scalability and reliability for commercial use.</p><h2 id="h-twilights-privacy-layer" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Twilight&apos;s Privacy Layer</strong></h2><p>Twilight&apos;s enhanced design effectively addresses these challenges.</p><p>We&apos;ve developed the Virtual Privacy Proxy Layer (VPPL), which combines the benefits of proxy technology — speed and flexibility — with enhanced security. VPPL routes traffic through at least two nodes, splitting knowledge between them to eliminate single points of compromise. It adds just <strong>5 ms of latency</strong>, which is negligible as the average page load time is 3000 ms. Based on the VLESS protocol, Twilight&apos;s VPPL ensures that traffic remains indistinguishable from regular HTTPS, even to DPI analyzers.</p><p>The DePIN approach allows Twilight to quickly expand to thousands of nodes by involving independent contributors and mitigates the risks of centralized control. In addition, with a vast network of outbound nodes, Twilight users become untraceable by VPN detectors, eliminating endless captchas and restricted website access.</p><blockquote><p>Did you know that centralized VPN services, relying on data center infrastructure, pay up to 10 times more for hardware? With decentralization, Twilight isn&apos;t just more secure, but it&apos;s also set to become one of the most efficient network infrastructures on the market.</p></blockquote><p>Our privacy layer will be accessible to both individual users and businesses.</p><p>Users can rely on the Twilight App to secure their everyday connections. We aim to make this app the go-to solution for tens of millions of people.</p><p>We’re also creating a seamless SDK that enables businesses to quickly and affordably integrate privacy features into their products.</p><h2 id="h-how-twilight-works" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>How Twilight works</strong></h2><p>Twilight&apos;s infrastructure operates on three core components: inbound nodes, outbound nodes, and validators. Each component has its essential role in the architecture. Inbound nodes handle user data, keeping it hidden from external view while outbound nodes ensure that the final destination remains concealed throughout the process. This enables a distributed knowledge approach, effectively removing a single point of compromise.</p><p>Here&apos;s a breakdown of a standard user request:</p><ol><li><p>When the user opens the app or activates the SDK, it automatically retrieves a list of nodes and routing options</p></li><li><p>Once a request is made, the proxy client encrypts the final destination using the outbound node’s public key and sends it through the network</p></li><li><p>The request first reaches the inbound node, which hides the original sender&apos;s identity</p></li><li><p>It is then forwarded to the outbound node, which decrypts the final destination and passes it through</p></li><li><p>The response follows the same path back to the user</p></li></ol><h2 id="h-twilights-token" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Twilight’s token</strong></h2><p>TWI tokens are used to create economic incentives across the Twilight Network while balancing supply and demand.</p><p>We settled on a <strong>Burn &amp; Mint model</strong>, battle-tested by leading DePIN projects like Helium. Access to Twilight requires Data points, a non-transferable internal currency pegged to USD, for stable pricing. Users burn Twilight tokens to generate Data points, which are used to purchase bandwidth. Node providers earn Data points based on traffic handled, which they can then burn to mint Twilight tokens.</p><p>To ensure security from day one, we&apos;re attracting a set of trustworthy validators through emerging <strong>restaking</strong> technology. The staking mechanism will also enhance both security and network stability.</p><p>TWI&apos;s governance role will also become vital to its utility as the network grows and attracts thousands of contributors.</p><h2 id="h-conclusion" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Conclusion</strong></h2><p>For years, true online privacy has been within reach but required a few simple yet essential upgrades to existing solutions. Rather than reinventing the wheel, we’ve enhanced proven technologies to address the lack of interoperability and decentralization. Twilight is set to revolutionize online privacy in the same way HTTPS  transformed the Internet’s security.</p><hr><p>If you’re interested in chatting more about privacy, feel to free to find us on <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://x.com/twilightlayer">X</a>.</p>]]></content:encoded>
            <author>extype@newsletter.paragraph.com (Extype)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/9fc61f00dbde17b0a01bc986d75daab3909deafc7576211f578c2abac3d4c228.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[The Twilight Vision - Privacy for the Internet]]></title>
            <link>https://paragraph.com/@extype/the-twilight-vision-privacy-for-the-internet</link>
            <guid>91jCSHmd8vP3nPJBz37c</guid>
            <pubDate>Mon, 26 Aug 2024 19:49:42 GMT</pubDate>
            <description><![CDATA[I. Privacy on the InternetRemember when going online was like stepping into a secret world? You could do whatever you wanted without anyone looking over your shoulder. Well, unfortunately, that was never the case. The Internet was not designed with privacy in mind. As with any human endeavor, its weaknesses have been exploited to the fullest. From early threats like website sniffing and man-in-the-middle attacks to today&apos;s pervasive data collection and surveillance, our online activities...]]></description>
            <content:encoded><![CDATA[<h2 id="h-i-privacy-on-the-internet" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>I. Privacy on the Internet</strong></h2><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/a9060cb6368e701c255cd49b05da5607dcf3c33d60dde0fc87ad228127f93102.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Remember when going online was like stepping into a secret world? You could do whatever you wanted without anyone looking over your shoulder. Well, unfortunately, that was never the case.</p><p>The Internet was not designed with privacy in mind. As with any human endeavor, its weaknesses have been exploited to the fullest. From early threats like website sniffing and man-in-the-middle attacks to today&apos;s pervasive data collection and surveillance, our online activities have become a goldmine for hackers and corporations.</p><p>While HTTPS has significantly improved web security, it hasn&apos;t solved the fundamental problem of user surveillance. Cookies, DPI, and other tracking technologies have become ubiquitous, allowing websites, apps, and internet providers to collect vast amounts of personal data. This has led to a growing demand for privacy solutions, as evidenced by the introduction of GDPR, Apple&apos;s no-cookies policy, and 1.5B VPN users.</p><p>Unfortunately, existing solutions, like VPNs, have a single point of compromise due to their centralized architecture. Browsers and companies can detect when you&apos;re using one, which often results in constant CAPTCHAs, and sometimes, even basic access to websites is blocked.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/742124536b12ca730fa753214cfa147411f472a299a8a656c9bc4344a132d570.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Decentralized finances are not an exception as well. Blockchain RPC nodes usually have access to the user&apos;s IP address, device, and other metadata, which allows companies like Arkham to deanonymize wallet owners.</p><p>Many tech companies are developing solutions to address this problem. Can we anticipate something effective soon, or is it already here? Unfortunately, most efforts fall short for two key reasons:</p><ol><li><p>The solutions are often too focused on specific ecosystems, as seen with <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://support.apple.com/en-us/102602">Apple</a> and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/bitcoin/bips/blob/master/bip-0156.mediawiki">Dandelion</a></p></li><li><p>They are overly complex and neglect user experience (Tor, P2P networks)</p></li></ol><p>We need a universal, trustless solution to protect our privacy across the Internet ecosystem. A solution that doesn&apos;t sacrifice speed or convenience.</p><hr><h2 id="h-ii-introducing-twilight" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>II. Introducing Twilight</strong></h2><p>Twilight is a DePIN privacy layer on Solana that will help users and companies make their traffic private and secure. We designed Twilight with three core principles:</p><ol><li><p>It must be <strong>universal</strong>, ensuring comprehensive network privacy across the Internet, blockchains, and applications. Our solution is compatible with any device or operating system, and we offer SDKs to other companies for seamless privacy integration into their apps.</p></li><li><p>It must be <strong>trustless</strong>, achieved with our custom VLESS protocol version – VPPL. This Virtual Private Proxy Layer processes traffic without participants having full access to user data. Encrypted data moves through 2 nodes, with only the final node having the keys to decrypt the destination without knowing the sender&apos;s identity.</p></li><li><p>It must be <strong>decentralized</strong>. The DePIN approach enables us to create a self-governed network that scales effortlessly to meet the growing demand for privacy solutions.</p></li></ol><p>The two-node approach adds just 5 ms of latency to the average 3000ms page load time, while our proxy technology — outperforming traditional VPNs — delivers unmatched speed for end users.</p><p>While this approach addresses privacy concerns, it’s natural to question its economic viability for billions of users. The answer is clear: yes, it’s cost-effective. Just as HTTPS revolutionized the Internet when computational power became affordable, VPNs were once costly due to underdeveloped hardware. We&apos;re now at a point where bandwidth costs allow us to prioritize privacy without making sacrifices.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/adeb7d431315d6896bc67dbf3ef38840ce7933474e005591ab4af9dd52cfacf1.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><hr><h2 id="h-iii-thesis" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>III. Thesis</strong></h2><p>A decade ago, HTTPS transformed the Internet by securing online traffic, marking a significant leap forward in web security. However, while it made our connections safer, it did not fully address the pervasive issue of user surveillance.</p><p>Today, with growing concerns about privacy and the limitations of existing solutions, we stand on the brink of a new shift. Twilight is set to be the next revolution, making Internet traffic not just secure but private. As the <strong>new foundational infrastructure of the Internet</strong>, we will lead the twilight of user surveillance.</p><hr><p>Consider following us on <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://x.com/twilightlayer">X</a></p>]]></content:encoded>
            <author>extype@newsletter.paragraph.com (Extype)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/cc160fd51735d7c719144db2c0efbcb8944b551355097e90ffbe8482846337ba.png" length="0" type="image/png"/>
        </item>
    </channel>
</rss>