- cross-posted to:
- hackernews@lemmy.bestiver.se
- cross-posted to:
- hackernews@lemmy.bestiver.se
What is Tyr?
We’re taught that email must go through servers. Why? Because the Internet was built around centralized infrastructure. Every email you send travels through multiple servers - your provider’s server, maybe a few relay servers, and finally your recipient’s provider’s server. Each hop is a potential point of surveillance, censorship, or failure.
Even “encrypted” email solutions still rely on these centralized servers. They encrypt the message content but the metadata - who you’re talking to, when, how often - is visible to anyone watching the servers.
But there is a network, called Yggdrasil, that gives everyone a free IPv6 and doesn’t need a blessing from your ISP. We finally have this possibility to use true P2P email. And moreover, this network has strong encryption to protect all data that flows from one IP to another.
Tyr brings true peer-to-peer email to your Android device using these unusual conditions. Unlike traditional email clients, Tyr doesn’t need:
❌ Centralized mail servers (the connections are straight P2P)
❌ Message encryption layers (the network takes care of that)
❌ Port forwarding or STUN/TURN servers (Yggdrasil handles NAT traversal)
Your email still goes through multiple hops (routers, your isp, …) regardless, no? Instead of you <encrypted traffic> your mailserver <encrypted traffic> your friend’s mailserver <encrypted traffic> your friend, you suggest ip based routing? Why? Instead of your isp knowing you contacted e.g. gmail, and google knowing who you really contacted, you cut out gmail, but instead leak your connection to every router along the way. It’s good if you trust your isp more than your mailserver host, but in the grand scheme of things I don’t see a direct benefit.
"Is Yggdrasil anonymous?
No, it is not a goal of the Yggdrasil project to provide anonymity. Direct peers over the Internet will be able to see your IP address and may be able to use this information to determine your location or identity. Multicast-discovered peerings on the same network will typically expose your device MAC address.
Other nodes on the network may be able to discern some information about which nodes you are peered with due to debug information currently exposed on the network, although the protocol design does not depend upon much of this." - Ygdrasil Github FAQ
Yggdrasil eliminates relay server level censorship, but does not pursue anonymity as a feature. OP is mistaken in that regard.


