I2P Address: [http://git.idk.i2p]

Skip to content
Snippets Groups Projects
Unverified Commit bec3db77 authored by zzz's avatar zzz
Browse files

more removal of old stuff

parent 716fa14e
No related branches found
No related tags found
No related merge requests found
......@@ -781,6 +781,8 @@ two in particular are pulled out here - Tor and Freenet.
<p>{% trans comparisons=site_url('comparison') -%}
See also the <a href="{{ comparisons }}">Network Comparisons Page</a>.
Note that these descriptions were written by jrandom in 2003 and
may not currently be accurate.
{%- endtrans %}</p>
<h2 id="similar.tor">Tor</h2>
......@@ -831,11 +833,6 @@ in a tunnel is important, as an adversary would otherwise be able to mount
a series of powerful predecessor, intersection, and traffic confirmation attacks.
{%- endtrans %}</p>
<p>{% trans -%}
Tor's support for a second tier of "onion proxies" does offer a non-trivial
degree of anonymity while requiring a low cost of entry, while I2P will not
offer this topology until <a href="#future.restricted">2.0</a>.
{%- endtrans %}</p>
<p>{% trans -%}
On the whole, Tor and I2P complement each other in their focus - Tor works
......@@ -881,20 +878,6 @@ Freenet team will pursue efforts in that direction, if not simply reusing
(or helping to improve, as necessary) existing mixnets like I2P or Tor.
{%- endtrans %}</p>
<p>{% trans -%}
It is worth mentioning that there has recently been discussion and work
by the Freenet developers on a "globally scalable darknet" using restricted
routes between peers of various trust. While insufficient information has
been made publicly available regarding how such a system would operate for
a full review, from what has been said the anonymity and scalability claims
seem highly dubious. In particular, the appropriateness for use in hostile
regimes against state level adversaries has been tremendously overstated,
and any analysis on the implications of resource scarcity upon the scalability
of the network has seemingly been avoided. Further questions regarding susceptibility
to traffic analysis, trust and other topics do exist, but a more in-depth
review of this "globally scalable darknet" will have to wait until the Freenet
team makes more information available.
{%- endtrans %}</p>
<h1 id="app">Appendix A: Application layer</h1>
<p>{% trans -%}
......@@ -1076,9 +1059,7 @@ to delivery through the mail.i2p outproxies, which are separate from the mail.i2
SMTP and POP3 servers - both the outproxies and inproxies communicate with
the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those
non-anonymous locations does not give access to the mail accounts or activity
patterns of the user. At the moment the developers work on a decentralized
mailsystem, called "v2mail". More information can be found on the I2P Site
<a href="http://{{ postman }}/">{{ postman }}</a>.
patterns of the user.
{%- endtrans %}</p>
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment