FAQ

What is a VPS?

VPS is an acronym for Virtual Private Server.

It’s virtual: A linux server abstracted from hardware.

It’s private: you get it all to yourself.

It’s a server: It is connected to the internet and can serve webpages.

How is P2P VPS different?

VPSs on the network are hosted by normal people. There is no data center.

In the beginning, speed and reliability will be lower than a centralized VPSs, because home internet connections are much more flaky that industrial data centers. P2P VPS makes up for these deficits in the following ways: cost is far lower, censorship and government snooping is much less likely, and servers can be rented anonymously, using cryptocurrency.

When the software is fully developed, a simple API will allow any application to rent and deploy additional computing resources on-the-fly. The API will also allow for filtering by specifications such as up-time, memory, or internet speed. These qualities open up new markets in the VPS space

How do I earn cryptocurrency with my computer?

Follow these instructions to install the P2P VPS client code on your computing device. You’ll need to create an account on P2PVPS.net and register your device in the Owned Devices dashboard. You will earn cryptocurrency in exchange for renting out your computing resources (CPU, Memory, Hard drive space, and internet connection) to the network.

Notice: P2P VPS is currently in Alpha release. That means the code is still unstable. So only daily rentals are available while we iron out the final bugs. You probably won’t make much cryptocurrency on the market right now, but we’d sure love you to try out the software and give us feedback!

Why would someone use a VPS?

Short Term Applications:

  • VPN Tunnel
  • Private messaging
  • Tor exit node
  • DNS server
  • Continuous Integration & Testing
  • Deploying content

Long Term Applications:

What are the security risks for hosting a VPS?

To protect your home network, it’s important to set up a firewall so that rented devices can not talk to any other devices on your network. These instructions walk you through the setup of such a firewall.

It’s also a good idea to bandwidth limit each device so that renters do not hog all your bandwidth. Wondershaper setup is included in the installation instructions.

What are the security risks for renting a VPS?

The security risks for renting a P2P VPS is the same as renting a VPS from a commercial provider like Digital Ocean or Amazon. Anyone with physical access to the device can enter your account and read your files. It is always recommended to encrypt your sensitive information, regardless of VPS provider. A P2P VPS specific tutorial will be created in the future, adapting this LUKS tutorial to P2P VPS.

Malicious device owners will also be mitigated through the use of a blockchain-based, immutable review system. There are several projects in development around this idea and we have not yet settled on which platform to use. This will weed out malicious hosts and reward privacy-focused hosts over the long term. In the short term, we will leverage OpenBazaar’s review system.

Many applications, like blog hosting and file sharing, do not require much trust. The P2P VPS project needs help from the community to develop solutions to application-specific security, such as cryptocurrency wallets or OpenBazaar store nodes. The Client Specifications describe the node application running both inside and outside the Docker container. It is possible to pass secure, encrypted messages from the server to the client which are never written to disk.

Join our Slack channel if you’re interested in contributing!

 

STAY IN THE LOOP.

Enter your name and email below to get updates on the P2P VPS Marketplace.

Check your inbox to confirm your request.