MANCON


1M5 dynamically bypasses attempts to censor communications between decentralized applications in which 1M5 is used. It does so by maneuvering against blocks and attacks on the internet as well as outside of the internet. This maneuvering experiences varying levels of situational conditions called MANCON.

MANCON is an alert state signalling the maneuvering required to achieve the mission. It can change at any time in response to new conditions arising. The base MANCON recommended for a claimed jurisdiction is largely based on the Press Freedom Index.

End-users can at any time select the MANCON they feel they need to protect their privacy.

...

No expected censorship or privacy intrusion attempts.

  • Web: will use HTTPS. Failures will assume the site is down.
  • Tor for .onion addresses
  • I2P for .i2p addresses
  • I2P is used for peer-to-peer services such as messaging
  • No additional latencies
...

Typical censorship attempts by states on reading news (public web sites getting blocked, government shutdown of cloud cdn content). No fear of circumventing censorship expected.

  • Web: When an HTTPS clearnet site appears down, other nodes will be used to attempt access. If these fail, the site will be assumed to be down.
  • All other routing remains unchanged.
  • Expect latencies of 500 milliseconds to 2 seconds.
...

Strong censorship attempts are being made with freedom of speech getting little support. Borderline police state is emerging. Potential retaliation for circumvention of censorship attempts. This is the default setting for 1M5.

  • Web: will use Tor as default access to clearnet sites. When Tor gets blocked, will use I2P/1DN to route around blocks.
  • All other routing remains unchanged.
  • Expect latencies of 1-10 seconds.
...

Police state emerging. Prison likely for censorship circumvention attempts.

  • Web: will use an I2P peer with random delays that has access to Tor to make the request.
  • P2P: direct comms with I2P but with random delays up to 90 seconds per I2P relay node.
  • Expect latencies of 4 seconds to 3 minutes.
...

Full on police state / dictatorship. Local cellular service towers shutdown. Death likely for censorship circumvention attempts.

  • Web: a 1DN peer will be used to access Tor and/or I2P.
  • P2P: 1DN peers will be used until a peer with I2P access can route the request.
  • Intentional random delays 90 seconds to 5 minutes per 1M5 relay node (up to 90 seconds per I2P relay node) will be used to help protect end-users.
  • Expect latencies of 4-30 minutes when in large cities with many 1M5 nodes.

SUPPORT 1M5

1M5 is an open source project powered by volunteers, bounties and gifts. In the spirit of open source and censorship resistance, we have opted to create 1M5 without the demands or influence of investors nor governments.


GitHub
Gift to the 1M5 Development Fund

If you support this project and are in a position to help that would be wonderful. Please request a bitcoin address using a contact method below.

Gifts to 1M5 are not tax deductible as it is not formally registered in any jurisdiction. By gifting Bitcoin to the 1M5 gift wallet, you will be helping 1M5 pay for our direct costs like web hosting, domain names, outsourced work, bounties, and so on. If you wish to support it anonymously, we recommend using Bisq as it uses Tor and using a source of Bitcoin that doesn't have your identity attached to it.
Get in Touch

Please don’t hesitate to get in touch if you can think of other ways you can help with the 1M5 project.

I2P: objectorange@1m5.i2p

Protonmail: objectorange@1m5.io

PGP: DD08 8658 5380 C7DF 1B4E 04C2 1849 B798 CF36 E2AF
If you wish to communicate anonymously, use the 1M5 channel on I2P's IRC. Leave a message and we will get back to you ASAP. As for email, we prefer communications using I2P first and protonmail.com second.