Decentralised VPN (dVPN) Comparison
Network Design
Mysterium Network
A global collection of nodes power a VPN network by sharing bandwidth P2P in exchange for cryptocurrency.
Users can easily become a node and also download the free VPN app to select from a global menu of IP addresses/bandwidth providers.
Orchid
VPN users connect to bandwidth sellers (nodes) using a directory. Node providers stake tokens to advertise these services.
Users install the Orchid VPN, add OXT to their wallet, and can then access the internet through their preferred path (single or multi-hop).
Sentinel
P2P VPN network also functioning as an SDK. Allows anybody to become a “resource node” by selling their unutilized computing resources in the marketplace.
Users mask their Internet traffic through a series of nodes.
VPN
A global VPN service which can provide Dedicated IP address, Double VPN, Onion Over VPN and connection to the Tor anonymity network.
As well as dedicated data centre servers around the world, centralized VPNs also allow P2P traffic on certain servers – there are hundreds of them in different locations around the world, optimized for file sharing.
How are nodes incentivised or rewarded?
Mysterium Network
Pilot program
Monthly bounties for UK, US, Italian and German participants, earning up to $600 in ETH per year. Only an email and IP address is required.
P2P payment network
Nodes set their own price based on supply and demand. This unique micropayments system utilises cryptocurrency payments, so nodes can sell their bandwidth in small intervals, ensuring security and convenience.
Orchid
Stake-weighting
Anyone can operate an Orchid Node, but must first stake (lock up as collateral) the native OXT cryptocurrency. The more OXT that is staked, the more traffic they can receive, and the greater the chances of reward in the Network.
Orchid uses an advanced payments architecture known as probabilistic nanopayments for per-packet network payments.
Sentinel
Resource Nodes can earn the native $SENT token in return for contributing network bandwidth and other resources by hosting a Service Node for the dVPN Service.
VPN
Nodes are not incentivized in centralized VPNs as these businesses own the infrastructure and charge end users for the service.
Node Onboarding
Mysterium Network
Anyone can run a node using their computer, mining equipment or compatible hardware such as a Raspberry Pi. Link your node to your Ethereum wallet address via an easy to use dashboard, My.Mysterium.Network to track your earnings.
No staking is required to be a node – sign up is free.
Orchid
Anyone can run a node by signing up to the stake registry and provider directory on the blockchain.
However, all new nodes must purchase and stake OXT to start receiving traffic.
Sentinel
Running a node requires technical knowledge of how to install a docker and configure a node. At present there is no user-friendly dashboard or application for download.
VPN
No need to onboard. By paying for the service, users get access to the VPN service, but do not help power it.
Costs & fees
Mysterium Network
Users pay in cryptocurrency for only the bandwidth they consume on a pay-per-use model.
Nodes pay no fees and earn cryptocurrency directly from users of this VPN service.
Orchid
Users pay for the bandwidth in OXT.
Nodes pay OXT to advertise their services.
Sentinel
Using their on-chain, inbuilt ‘Token Swap’ feature, users can privately purchase $SENT tokens to access any service on the Sentinel network.
Running a node is free.
VPN
Monthly subscription model, rather than a pay-as-you-go structure. Users get access to a VPN service where they can select from IP addresses based all over the world to suit their browsing needs.
VPN Security
Mysterium Network
Layered protection protocols built to protect any individual or organization. Mysterium is a fast and scalable transport security layer to reinvent privacy via VPN. Traffic is encrypted and sharded into separate pieces, filtered in an unrecognisable form through the distributed node network — without the possibility of being traced or censored.
Orchid
Users can select single- or multi-hop onion routed circuits by selecting nodes randomly weighted on stake and filtered by price, location, etc. A single hop route has the benefits of a normal VPN connection, creating a tunnel to route your traffic over a public network or your ISP, while a multi-hop connection provides additional privacy benefits by securing your network data from any one provider.
Sentinel
Swixer is Sentinel’s first utility that allows anybody to simply convert their cryptocurrency tokens online while keeping their data away from prying eyes.
User’s privacy is enhanced by Swixer’s cross-chain swaps between the Ethereum chain and other blockchains which possess a working zero-knowledge protocol or privacy layer within the protocol.
VPN
Traditional VPN services route all users’ internet traffic through a remote server, hiding IP addresses and encrypting all incoming and outgoing data. For encryption, they use the OpenVPN and Internet Key Exchange v2/IPsec technologies in their applications.
One company admits their servers were hacked due to an expired internal private key being exposed, potentially allowing anyone to spin out their own servers imitating their own.
Logging policy
Mysterium Network
No logs! Mysterium protocol removes any technical possibility for collecting or storing logs centrally.
Orchid
No logs.
Sentinel
No logs.
VPN
In theory, a centralized VPN could keep logs, but most state they are committed to a zero-logs policy.
Node Security
Mysterium Network
Mysterium allows users to select whitelisted traffic only, designed to protect nodes. However nodes can choose to accept any kind of traffic and increase their earning potential. They identify and block bad actors from the network through the use of registered identities and reputation system
Orchid
Users can prevent certain kinds of attacks from malicious exit nodes by using a default exit node whitelist consisting of trusted VPN partners. Users can use their own whitelists, and eventually well known third parties will emerge as whitelist curators.
Sentinel
Sentinel is developing a relay network, where participants in the network can choose to be a relay or an exit node on which encrypted tunnels traffic between the VPN paid user and an exit node.
It will also involve the use of governance nodes which will dictate path of packet transmission between user and exit node.
VPN
Nodes are protected as the centralized VPN assumes all security and legal risks.
Ease of Use
Mysterium Network
VPN is a simple to use and free desktop or mobile application.
New nodes can get set up in just 5 minutes and 5 steps via a simple, user-friendly dashboard. There is a knowledgebase and support team on hand to help.
Users will need to have some basic understanding of cryptocurrency and must have an Ethereum/Polygon wallet set up to receive payments.
Orchid
VPN app designed for mobile and desktop. People wishing to be nodes must register and have some prior knowledge of cryptocurrency and staking.
Sentinel
Sentinel is not user-friendly and is better suited to more technically proficient users or those intuitive with Ethereum DApps and blockchain platforms.
VPN
Smart algorithms automatically select the best VPN server for you based on location, loads, or your special requirements.
They also have a dedicated support team.
Scalability
Mysterium Network
As with most P2P infrastructure, the more participants which join the network, the stronger and more robust it becomes.
Mysterium’s micropayments system is a homegrown Layer 2 solution. It was built to handle large volumes of users and transactions, making the network faster and more scalable.
Orchid
Orchid uses a probabilistic payment system which scales to millions of transactions per second, enabling a highly liquid bandwidth market without a trusted central party.
Sentinel
Sentinel’s “multi-chain architecture” secures data exchange between people and both centralized and decentralized applications meaning. This is meant to solve problems with infrastructure and scaling.
VPN
Depends on high bandwidth throughput and fast connection speeds to provide an optimal service for their users. Often use multiple tunneling protocols to ensure their network can scale and can adapt to various needs.
You choose!