Skip to content

Under Construction

This section is currently being developed and may be incomplete/outdated.

How Waveshift Works

Waveshift is a comprehensive networking platform that combines hardware nodes, cloud infrastructure, and advanced privacy features to create secure, anonymous internet access and private mesh networking capabilities.

System Overview

The Waveshift system consists of three key components:

1. Control Hub

A GL.iNet router flashed with Waveshift firmware that manages and coordinates all connected nodes. It serves as the entry point for control data traffic to the Waveshift Control Plane hosted in AWS.

2. Nodes

Configurable GL.iNet routers (Slate AX) flashed with Waveshift firmware. Nodes allow non-Waveshift devices to be bootstrapped into the Waveshift network by providing local network connectivity with automatic VPN routing.

3. Waveshift Control Plane (WCP)

The cloud-hosted management system running in AWS that: - Provisions Points of Presence (PoPs) on demand - Manages WireGuard configurations - Coordinates between nodes and egress servers - Provides the user interface for management

Waveshift System View


Network Architecture

Physical Network Topology

The Waveshift network connects local devices through a layered architecture:

  1. Local Area Network (LAN)
  2. Nodes provide LAN connectivity for user devices
  3. Devices connect via Ethernet to the nodes
  4. All traffic is automatically routed through secure WireGuard tunnels

  5. Control Hub Connection

  6. Control Hub connects to the internet via a standard router
  7. Creates WireGuard tunnel to Waveshift Control Plane in AWS
  8. Nodes connect to both Control Hub (for management) and internet (for data)

  9. Multiple Internet Circuits

  10. Each node should ideally have its own internet circuit with unique egress IP
  11. This maintains privacy by preventing traffic correlation

LAN Network Basic


Point of Presence (PoP) Architecture

What is a PoP?

A Point of Presence is an on-demand AWS infrastructure deployment that provides: - WireGuard VPN server with unique public IP - Optional Cloudflare WARP integration for traffic normalisation - Optional Kasm Workspaces integration for secure browsing - Private peer-to-peer connectivity between devices

PoP Provisioning Process

When a user provisions a PoP through the Waveshift console:

  1. User Configures PoP via web interface, selecting:
  2. Egress location (AWS region)
  3. Enable/disable Node integration
  4. Enable/disable Kasm Workspaces
  5. Enable/disable Cloudflare WARP final egress
  6. Number of additional WireGuard peer configs

  7. Control Plane Provisions Infrastructure:

  8. Deploys EC2 instance in selected AWS region
  9. Configures WireGuard server
  10. Generates peer configurations
  11. Sets up security groups and networking

  12. Configuration Distribution:

  13. WireGuard configs made available via QR codes or files
  14. Nodes automatically configured if Node integration enabled
  15. Kasm workspace automatically configured if enabled

Waveshift Point of Presence Provisioning

PoP Build Sequence

The automated build process follows a specific sequence:

Build Sequence


Node Configuration and Connectivity

Automatic Node Configuration

When a PoP is built with Node integration enabled:

  1. Control Plane selects an unassigned node from the pool
  2. WireGuard configuration is automatically deployed to the node
  3. Firewall rules and VPN killswitch are configured
  4. Node becomes associated with the PoP

Waveshift Node Configuration

Node Internet Connectivity

Nodes provide secure internet access for connected devices:

  1. Device connects to Node LAN port
  2. Traffic is routed through WireGuard tunnel on the node
  3. VPN killswitch ensures no traffic leaks if tunnel fails
  4. Traffic egresses through the PoP's public IP address
  5. Optional Cloudflare WARP provides additional anonymisation

Waveshift Node Internet Connectivity


Data Flow Overview

Basic Traffic Flow

graph LR
    A[User Device] -->|Ethernet| B[Node LAN]
    B -->|WireGuard Tunnel| C[AWS PoP]
    C -->|Optional Cloudflare| D[Public Internet]

Detailed Data Path

Basic Data Flow Overview

Traffic Flow Steps:

  1. User device connects to Node via Ethernet
  2. Node encrypts all traffic with WireGuard
  3. Traffic traverses internet through Node's circuit
  4. AWS PoP decrypts WireGuard traffic
  5. If Cloudflare disabled: Traffic egresses directly from PoP
  6. If Cloudflare enabled: Traffic re-encrypted and sent to Cloudflare WARP
  7. Cloudflare WARP decrypts and sends to public internet
  8. Response follows reverse path

Cloudflare WARP Integration

Why Integrate Cloudflare WARP?

Waveshift uses a hybrid approach combining AWS PoPs with Cloudflare WARP to provide:

Benefits of AWS PoPs: - Full control over infrastructure - Choose specific egress location - No shared VPN IP addresses - Transparent operation

Benefits of Cloudflare WARP: - Massive anonymity set (millions of users) - Shared exit IPs - Traffic normalisation - Additional layer of encryption

Traffic Normalisation

By routing through Cloudflare WARP:

  1. Your traffic is encrypted by WireGuard to AWS PoP
  2. AWS PoP forwards to Cloudflare WARP server
  3. Cloudflare sees traffic originating from AWS (not your real IP)
  4. Internet sees traffic coming from Cloudflare shared IP
  5. Your origin is protected by two layers of anonymisation

This is what we call traffic normalisation - your traffic blends into millions of other Cloudflare WARP users, making it extremely difficult to identify or track.

Anonymity Set Comparison

Service Anonymity Set Size Shared Exit IPs Your Control Use Case
Waveshift (AWS only) Very small (just you) No Full Private dedicated access
Waveshift + Cloudflare Very large (millions) Yes High Anonymous normalized access
Cloudflare WARP alone Very large (millions) Yes None Limited to nearby regions
Commercial VPN Large Yes None General anonymity

Cloudflare Integration Sequence

sequenceDiagram
    participant Client
    participant Proteus
    participant AWS PoP
    participant Cloudflare

    Client->>Proteus: Request WG-CF Config
    Proteus->>AWS PoP: Build WireGuard Instance
    Note right of Proteus: Peer Public keys in User Data
    AWS PoP->>Cloudflare: Register Device (WGCF)
    Note right of AWS PoP: PoP Public key provided to Cloudflare
    Cloudflare-->>AWS PoP: Device Registration Response
    AWS PoP-->>Proteus: Server WG Pub Key
    AWS PoP-->>Proteus: WireGuard Instance Built
    Note right of Proteus: PoP Public Key via SSM Parameter Store
    Proteus-->>Client: WireGuard Peer Configs

    Client->>AWS PoP: Connect via WireGuard
    AWS PoP->>Cloudflare: Forward via WARP
    Note right of Cloudflare: Authenticate & Route Traffic
    Cloudflare-->>Internet: Normalized Traffic

Peer-to-Peer Networking

Devices on the same PoP can communicate directly and securely:

  • Private VPN network between all peers on the same PoP
  • End-to-end encryption via WireGuard
  • No internet exposure for P2P traffic
  • Multi-device collaboration possible

Use Cases: - File sharing between trusted devices - Remote desktop access - Private gaming servers - Secure team collaboration


Kasm Workspaces Integration

What is Kasm?

Kasm Workspaces provides containerized browser environments for secure web browsing.

Waveshift + Kasm

When Kasm integration is enabled on a PoP:

  1. Dedicated Kasm account is created for the user
  2. Browser workspace is automatically configured with PoP as egress provider
  3. All browser traffic routes through the selected PoP location
  4. Isolated environment protects your main device
  5. Destroy when done - all traces removed

Benefits: - Browser fingerprinting resistance - Sandboxed environment - No local trace of activity - Easy egress location switching


Security Features

Encryption

  • WireGuard protocol for VPN tunnels (Curve25519, ChaCha20)
  • End-to-end encryption between device and PoP
  • No logging of traffic by default
  • Forward secrecy protects past communications

Privacy Features

  • VPN killswitch on nodes prevents leaks
  • No DNS leaks - all DNS via WireGuard tunnel
  • Firewall rules block non-VPN traffic
  • Unique egress IPs per PoP (no sharing)
  • Traffic normalisation via Cloudflare (optional)

Entropy and Key Generation

Waveshift ensures cryptographically strong WireGuard keys by:

  • Public entropy sources - Uses Drand (distributed randomness beacon)
  • Hybrid approach - Combines public entropy with local generation
  • Authenticated sources - Only verified, signed entropy used
  • Headless server protection - Ensures sufficient entropy even on cloud servers

Deployment Flexibility

Multiple Egress Locations

  • Deploy PoPs in any AWS region worldwide
  • Switch between locations instantly
  • Multiple active PoPs simultaneously
  • Each PoP is independent

Scalability

  • Per-user limits: Up to 256 PoPs
  • Per-PoP peers: Up to 254 devices
  • Organisation limits: Configurable by admin
  • On-demand provisioning: Spin up/down as needed

Summary

Waveshift provides:

Privacy - Multi-layer anonymisation with traffic normalisation
Control - Choose exact egress locations worldwide
Flexibility - Nodes, direct configs, or Kasm workspaces
Security - Strong encryption, killswitches, isolated environments
Simplicity - Hardware that works out of the box
Scalability - From single user to organisation-wide deployments


See Also