In practice though, I don’t see much difference. I2P is touted as superior to Tor with its garlic routing which is claimed to be an improvement to onion routing. The reason I set up an Eepsite is similar to why I have a Tor hidden service, is to let people visit my website () anonymously. This post is Part 5 of a series of articles that show you how I set up Caddy, Tor hidden service and I2P Eepsite on NixOS: This website can be accessed using this B32 address or mdleom.i2p In this segment, I show you how I set up I2P Eepsite service that reverse proxy to. You can always get less anonymous, but going the other way is harder.: Updated to Caddy 2.1 syntax. Maintaining privacy for a while might be a good idea. Some a truly anonymous, some are semi anonymous, and some like me are not anonymous. Is it irresponsible of me to work on an implementation in the clear?Ībout privacy, people have taken various stances. Without any detail of course, can you comment on how necessary this has been. > Privacy of developers seems a priority. You can find me under the nick hottuna there. I was previously unaware of your Go implementation, but you should definitely head over to #i2p-dev and say hi. However the alternative implementations are not maintained under the I2P project as the developers of them desire to be separate. We all cooperate and discuss specifications to maintain interoperability. Are there any devs who might be interested in contributing?Ĭurrently there are 3 implementations of I2P apart from yours. Haven't made to irc2p to introduce myself yet but I will. Going forward I hope to see more cryptographic systems that aspire to reduce overall state. However, the idea of reducing state is a very good one. It's been a while since I read the HORNET paper, but as I remember it, HORNET relied heavily on ISP level cooperation which is just not realistic. > Do you have any thoughts on HORNET? Could I2P benefit from a more stateless routing mechanism as opposed to tunnels in the far future? ) My contributions are relatively minor and I2P (as well as other crypto systems) is something I really believe in. Some sites that are super annoying to TOR users, work extremely well under I2P and don't detect that you are not a clearnet user. I understand it works quite a bit differently, and what I do know is appealing.īut it is currently "meh". There hasn't been much public research into how it works or vulnerabilities, as with the TOR network. There's nothing else to really say about I2P. It is one of the more actively developed cryptocurrencies, and I2P integration is still on their roadmap. My cryptocurrency market capitalization, it has remained around #10 for two years. Monero is an opaque blockchain that has worked out of the box as a private cryptocurrency since early 2014. Anoncoin's steward disappeared with an unsuccessful zerocoin implementation and exit scam. In this regard it is kind of like bittorrent where other peers in the network can see information about you.)Īs far as formal partnerships go, Anoncoin was the closest, where they got some public mention from the I2P stewards, and had icons on the I2P dashboard when you logged into that darknet. (Most cryptocurrencies broadcast a lot of information about you to the nodes, and when you really dive into it, the result is a little unsettling. The primary goal being to include a native I2P routing client within all of the respective cryptocurrency's daemon's and client software. None of the cryptocurrency communities have successfully integrated with I2P.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |