The objective of this thesis is to describe the implementation of an authentication method for a VPN server through Bitcoin payments. Bitcoin payments enable the exchange of value in a pseudonymous and decentralized manner, while VPN technology ensures secure and protected connections between different network components. The integration of VPN technology with Bitcoin payments thus allows for permissionless and anonymous access to a fully protected connection, providing users with a centralized service that remains entirely anonymous and secure. Through the analysis of this implementation, we will evaluate its advantages and disadvantages, offering guidelines for designing an authentication method that leverages Bitcoin payments while safeguarding user privacy.
The objective of this thesis is to describe the implementation of an authentication method for a VPN server through Bitcoin payments. Bitcoin payments enable the exchange of value in a pseudonymous and decentralized manner, while VPN technology ensures secure and protected connections between different network components. The integration of VPN technology with Bitcoin payments thus allows for permissionless and anonymous access to a fully protected connection, providing users with a centralized service that remains entirely anonymous and secure. Through the analysis of this implementation, we will evaluate its advantages and disadvantages, offering guidelines for designing an authentication method that leverages Bitcoin payments while safeguarding user privacy.
Secure VPN authentication through Bitcoin and Blockchain: an implementation
PAROLINI, LUCA
2024/2025
Abstract
The objective of this thesis is to describe the implementation of an authentication method for a VPN server through Bitcoin payments. Bitcoin payments enable the exchange of value in a pseudonymous and decentralized manner, while VPN technology ensures secure and protected connections between different network components. The integration of VPN technology with Bitcoin payments thus allows for permissionless and anonymous access to a fully protected connection, providing users with a centralized service that remains entirely anonymous and secure. Through the analysis of this implementation, we will evaluate its advantages and disadvantages, offering guidelines for designing an authentication method that leverages Bitcoin payments while safeguarding user privacy.File | Dimensione | Formato | |
---|---|---|---|
Parolini_Luca.pdf
accesso aperto
Dimensione
495.31 kB
Formato
Adobe PDF
|
495.31 kB | Adobe PDF | Visualizza/Apri |
The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License
https://hdl.handle.net/20.500.12608/82529