|
Remobo is a zero-configuration Instant Private Network (IPN) or virtual private network (VPN) freeware application that directly connects users' computers as if they were on the same local area network. It also works behind NAT firewalls. It is currently in beta and there are versions for Microsoft Windows and Mac OS X, as well as Linux (beta). How it works All the registered Remobo users have their own "Instant Private Network" (IPN). For example, when a Remobo user Alice logs in from any computer that has the Remobo program installed, that computer becomes a member of Alice's IPN. Alice can log in from multiple computers at the same time, and all logged-in computers are members of Alice's IPN, which means all Alice's computers are connected to each other as if all these computers are on the same Local Area Network (LAN). A computer is a member of a Remobo user's IPN only for the duration of this Remobo login session. For example, when Alice logs off Remobo from any of her computers, that logged-off computer is taken off Alice's IPN network. No data about Alice is left behind on that logged-off computer. Remobo users can also share their IPNs with their friends. For example, when a Remobo user Alice invites her friend Bob (who must also be a Remobo user) as a "buddy" in Alice's Remobo network, all computers that Alice & Bob are currently logged-in on become members of the IPN, which means all Alice's and Bob's computers are connected to each other, as if all these computers are on the same LAN. The "buddies" of a Remobo user do not see each other through this specific Remobo user. For example, if Alice has both Bob and Carl as her Remobo buddies, then all of Alice's and Bob's computers are connected to each other, and all of Alice's and Carl's computers are connected to each other, but none of Bob's computers are connected to any of Carl's computers, unless they are Remobo buddies of each other, too. Mobility In Remobo, the network connections are created at a user level rather than a machine level, so users can be mobile and create instant network connections anywhere they are logged in. This is different from traditional VPN that authenticate nodes in the network based on machine ID. The network does not statically assign unused blocks of private IP addresses, so your IP address will change each time you login. There is a dynamic DNS service provided by Remobo to query a user's Virtual IP address at a specific machine the user is currently logged-in, via <MachineID>.<UserID>.remobo.com. Also, since a single Remobo user may log in concurrently at multiple machines, the DNS query of <UserID>.remobo.com gives a list of Virtual IP addresses for all the machines that a user is currently logged in on. Security Remobo claims to use strong industry-standard algorithms, including RSA private/public key exchanges and 256-Bit AES encryption, to secure and authenticate the data & traffic. All the Remobo users create their own Private-/Public-Keys at registration time, and any data they generate, including profile and presence info, are encrypted using their Private Keys. All network connections are established through Diffie-Hellman key negotiation, and encrypted using IPSec-based standard protocols. So all data that travels over the Instant Private Network is secured from third party snooping. Compatibility The current builds of Remobo (v0.20.1) are available for the following operating systems: *Microsoft Windows, including both 32-bit and 64-bit Vista/2008/2003/XP/2000 *Mac OS X A beta version is available for Linux x86, yet requiring root privileges.
|
|
|