Privacy-preserving tech is accelerating β€” and OHTTP is quickly becoming core infrastructure.

Our partners at Confident (@confidentsecurity) shared an excellent overview of how OHTTP enables anonymous requests across the internet, with adoption from Apple, Google, Mozilla, Meta, and others.

Fastly is proud to be one of the primary OHTTP relay providers, handling tens of millions of requests with low latency and privacy at scale.

πŸ”—https://blog.confident.security/ohttp/

#Privacy #Security #OHTTP #EdgeCompute

Anyone familiar with #Tor and the onion routing, what do you feel when you read https://www.rfc-editor.org/rfc/rfc9540.html (RFC 9540
Discovery of Oblivious Services via Service Binding Records)

That kinda reads like a bad joke. My only interpretation is that this is not to provide anonymity or privacy but about introducing a MITM proxy to centrally aggregate the connection data (through correlating it with publicly known information) in order to track and monitor users more easily.

#Tor #TorProject #onion #OHTTP

RFC 9540: Discovery of Oblivious Services via Service Binding Records

This document defines a parameter that can be included in Service Binding (SVCB) and HTTPS DNS resource records to denote that a service is accessible using Oblivious HTTP, by offering an Oblivious Gateway Resource through which to access the target. This document also defines a mechanism for learning the key configuration of the discovered Oblivious Gateway Resource.

@ligniform @darkphoenix @jomo oh yeah, though they say it uses some clever routing to not route data to them directly and thus make it independent/not connect it of the IP address.
As far as I read #oHTTP it seems to be just some kinf of proxy (that cannot read the proxied content, as it's encrypted)?
https://datatracker.ietf.org/doc/html/draft-ietf-ohai-ohttp-10

https://blog.mozilla.org/en/products/firefox/partnership-ohttp-prio/

Oblivious HTTP

This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.

IETF Datatracker
We've released #Netty #OHTTP incubator version 0.0.4.Final. It now has a much faster HPKE implementation based on BoringSSL. Some breaking changes were introduced to allow this. Release notes: https://netty.io/news/2024/01/12/ohttp-0-0-4-Final.html
Netty.news: Netty/Incubator/Codec/OHTTP 0.0.4.Final released