If you compare an IP address to a phone number, you could make the analogy DNS is a like a phone book, where Google.com's "phone number" = 142.250.199.46 (Google has multiple IP addresses but that is one of them).
If you go to this website and ignore any security warnings from the browser, it will load Google - https://142.250.199.46/
What you're describing is actually how a VPN works. Hundreds of people share the same IP address and it's the VPN provider who determines where the packets requested end up.
Your ISP knows you're connected to the VPN, and how much bandwidth is being used, but nothing else. In essence, your VPN host has the same information your ISP would normally have.
Do you trust your VPN host more than your ISP? You have to trust someone else if you want to go online.
With that being said, a VPN will not protect you from the NSA and will not protect your anonymity, as they have many other ways of determining your identity.
TOR and Tails adds the additional layers of security needed in theory, until you realize some of the exit nodes are controlled by 5 Eyes government agencies.
Then there's the fact even installing additional fonts in a vanilla Windows install is enough to create a unique digital fingerprint that can be used to track you online.
The best protection is staying offline completely.
What he's talking about is E2E encryption with a public access blockchain whereupon you, the user, would be able to retrieve essentially public available data. Only diff between you and some rando is that you and you alone have a key kept offline.
You want to ping a server? Add to the bIockchain. Server should be able to access that with their own key without knowing the sender, since it's all there. Just need to know what and where.
There's probably a more efficient way to do this. Just saying.
The IP address shouldn't matter if you get thousands of millions of blocks of random info.
Don't think you understand.
If you compare an IP address to a phone number, you could make the analogy DNS is a like a phone book, where Google.com's "phone number" = 142.250.199.46 (Google has multiple IP addresses but that is one of them).
If you go to this website and ignore any security warnings from the browser, it will load Google - https://142.250.199.46/
What you're describing is actually how a VPN works. Hundreds of people share the same IP address and it's the VPN provider who determines where the packets requested end up.
Your ISP knows you're connected to the VPN, and how much bandwidth is being used, but nothing else. In essence, your VPN host has the same information your ISP would normally have.
Do you trust your VPN host more than your ISP? You have to trust someone else if you want to go online.
With that being said, a VPN will not protect you from the NSA and will not protect your anonymity, as they have many other ways of determining your identity.
TOR and Tails adds the additional layers of security needed in theory, until you realize some of the exit nodes are controlled by 5 Eyes government agencies.
Then there's the fact even installing additional fonts in a vanilla Windows install is enough to create a unique digital fingerprint that can be used to track you online.
The best protection is staying offline completely.
What he's talking about is E2E encryption with a public access blockchain whereupon you, the user, would be able to retrieve essentially public available data. Only diff between you and some rando is that you and you alone have a key kept offline.
You want to ping a server? Add to the bIockchain. Server should be able to access that with their own key without knowing the sender, since it's all there. Just need to know what and where.
There's probably a more efficient way to do this. Just saying.