Brother, memory safety prevents buffer overflows, not someone dumping your RAM with /proc/mem or a debugger. You're talking with a full-stack developer and I have been doing reverse engineering since I was 14.
That's about performance optimization from rewriting old code, not memory safety magic, they literally rewrote WireGuard-Go to be faster, the language switch was incidental to cleaning up their mess, Rust is known to be very optimized for performance and definitely easier to use compared to C/C++
If you are going to hide from govs, it's difficult, you can't fix everything in life.
Even if you use any high secure models there is some sort of limitation.
Read the full white paper to understand the full picture.
I mean all this page says is that they use multiple hops in some sorta mesh like network. They never mention how they provide their IP addresses without any 'central servers'
I mean all this page says is that they use multiple hops in some sorta mesh like network. They never mention how they provide their IP addresses without any 'central servers'
THE IDEAL PATH What if we replace the controlled and surveilled IP addresses with new internet addresses that are based on nym address? These addresses will inherit all nym address features, i.e., ...