Why is Torgap Important?
Torgap supports privacy, service anonymity, identity psuedonymity, non-correlation, censorship-resistance, and seperation-of-interests and reduces single-points-of-failure. (Basically, it allows for networked connections without sharing all of the information about the participants, reaping various rewards as a result.)
How Does Torgap Work?
The following network diagram demonstrates an architecture that mixes airgaps and torgaps to produce a well-protected network architecture.
In this example:
- The remote iOS Gordian Wallet app uses a Torgap to communicate with the Mac Gordian Server bitcoin full-node located at home, which confirms Bitcoin transactions.
- The remote iOS Gordian Wallet app seperately communicates through a Torgap with a Linux Spotbit server in the cloud, which aggregates bitcoin price information.
More on Spotbit
Spotbit is currently our premiere Torgap application because it demonstrates a fully functional, publicly accessible example of Torgap usage. Though Bitcoin has long provided Tor interaction as an alternative method for accessing your full node, Bitcoin pricing services have remained a security hole: you could access your node, and so spend Bitcoin, but if you ever looked up pricing information, the whole world would know you were using Bitcoin. Worse, a pricing service could reveal to an attacker every single IP address that had accessed it, putting all of those users’ coins in jeopardy.
Spotbit resolves these privacy and security problems by creating a Torgap between your wallet and the pricing service, and also serves as the first example of a Gordian microservice, which can provide additional functionality to data-asset applications.