Skip to main content
MVP Status - Improvements being made

Decentralized Proxy Network

Control your network traffic with a P2P proxy built on libp2p. No central servers. Full control. Your rules.

How It Works

Understanding the data flow through Bethrou's P2P proxy network

1
Your Application
Browser, CLI tool, or any SOCKS5-compatible app
SOCKS5 Protocol
2
Bethrou Client
Local SOCKS5 proxy server on localhost:1080
libp2p Stream
3
Exit Node
Trusted peer in your private network
TCP Connection
4
Destination
Final target on the internet
Private Network
Pre-shared key isolates your network
P2P Architecture
No central servers, built on libp2p
NAT Traversal
Relay nodes handle firewalls
Load Balancing
Multiple routing strategies

Real-World Use Cases

See how Bethrou solves networking challenges across different scenarios

Privacy & Control

Route through your own infrastructure

Direct your internet traffic through servers you control. Eliminate third-party visibility into your network activity.

Full traffic controlCustom exit pointsNo ISP logging

Global Testing

Multi-region application testing

Deploy exit nodes across geographic regions to test application behavior from different locations without VPN infrastructure.

Multiple regionsDynamic selectionLoad distribution

Network Isolation

Private networks for teams

Create completely isolated networks accessible only to authorized peers. Perfect for development teams needing private infrastructure.

Pre-shared keysZero exposureTeam-only access

NAT Traversal

Bypass restrictive firewalls

Automatically relay traffic through intermediary nodes when direct connections fail. Connect from anywhere behind any firewall.

No port forwardingRelay fallbackAlways connected

Secure Tunneling

End-to-end encrypted connections

All traffic is encrypted with libp2p noise protocol. No exit node can see your traffic, only your application data.

Encrypted streamsPerfect forward secrecyZero-knowledge design

Distributed Networks

P2P without central servers

Build decentralized networks where every node is equal. No single point of failure, no central authority needed.

No central pointPeer discoverySelf-healing

Get Started in 6 Steps

Set up your first private proxy network in minutes

Step 1 of 6 Complete
1
Generate Network Key
Create a pre-shared key to isolate your private network
Terminal Command
echo "/key/swarm/psk/1.0.0/" > network.key echo "/base16/" >> network.key openssl rand -hex 32 >> network.key

What's Next?

1

Explore Advanced Config

Learn about custom routing rules, multiple exit nodes, and performance tuning

2

Deploy to Production

Use Docker for easy deployment or run on your own servers

3

Contribute to Project

Help improve Bethrou by contributing features, fixes, and documentation on GitHub