The blind middle-man theory

The M2 NETWORK provide a mechanism that enable a logical line between two peers on session level using slim proxies. The purpose is to blind up sender and receiver information during communication (IP addressing information).

Since sender and receiver IP address always are available on in each data packet sent on the Internet, the IP address identity of any machines communicating on the Internet might be traced in any router between A and B. The only way to protect this information are to discreetly change the IP addresses during the transport from A to B with some kind of proxies.

The blind middle-man theory is the theory of making a packet switched network (like Internet) into a line switched network (like the good old analog phone network long time ago) because a fixed line do not need any address information contained into the data transported.

Same strategy are used by the virtual private networks or the Tor project.

The neutral middle-man requirement

  • Forward only, removing IP address origin and destination trace between sender and receiver.
  • Have no (or very limited) knowledge of who are involved in the communication.
  • Operate non logged, non persisting and in memory of the service and have no back-door into any meta-data.
  • Not able to tamper with and read / report any content and have no back-door into any data.
  • Session and service information only exists for as long as the communication session exists, leaving no trace when session is completed.

Functionality

  • Any number of middle-men are started anywhere on the Internet.
  • A middle-man offer its services to one or more KA server’s (look-up services in m2) while running.
  • At peer look-up KA servers contact by random a number of active middle-men. The first serving middle-man (or more of them) providing a capacity will be introduced to the peers as a middle-man by the KA server.
  • Both peers receive the middle-man address instead of the other peer address, and start communicate to the middle-man, presuming the middle-man is the true party.
  • The middle-man forward the UDP packet as long as session live and destroys the session when no activity (60 seconds approximately).
  • The middle-men can not tamper or discover any content of any data since the data are encrypted directly between the two peers communicating.

What is really happen is that the middle-man do the work of a NAT router, performing address and port translation on the UDP packet for a period of time (same story, new wrapping), but in this context for the purpose of disorganize the addressing, rather than organize it.