[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
BlackHat2014: Deanonymize Tor for $3000
In general what grarpamp said is true, however we should remember that I2P
(aka Invisible Internet Protocol) is designed to be "a real undernet" and
thus it is focused mostly on hidden services and invisible hosting. It
results in fact that there is much less outproxies than in TOR network.
Using I2P to acces a "standard" Internet but in anonymous way is much less
efficient than via TOR only because of that design issue, moreover I2P is
just less popular than TOR and has less participating nodes, what
additionally decreases it's efficiency.
Zegar
On 4 July 2014 23:04, grarpamp <[email protected]> wrote:
> On 7/4/14, grarpamp <[email protected]> wrote:
> >
> https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget
>
> I2P is a tool that likely presents the nearest analog to Tor's hidden
> services (.i2p) to the user. Usable in much the same way.
> Always good to be familiar with and have other options out there.
> And see that they receive community research and review efforts too.
>
> http://geti2p.net/en/comparison/tor
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20140705/074f946c/attachment.html>