diff --git a/i2p2www/pages/site/docs/how/tech-intro.html b/i2p2www/pages/site/docs/how/tech-intro.html index 338e1c49217b4ac0318bb031f777ce41b2fafc65..8d97615f5c6f44a2df5247204c5e06f482f2c14e 100644 --- a/i2p2www/pages/site/docs/how/tech-intro.html +++ b/i2p2www/pages/site/docs/how/tech-intro.html @@ -781,6 +781,8 @@ two in particular are pulled out here - Tor and Freenet. <p>{% trans comparisons=site_url('comparison') -%} See also the <a href="{{ comparisons }}">Network Comparisons Page</a>. +Note that these descriptions were written by jrandom in 2003 and +may not currently be accurate. {%- endtrans %}</p> <h2 id="similar.tor">Tor</h2> @@ -831,11 +833,6 @@ in a tunnel is important, as an adversary would otherwise be able to mount a series of powerful predecessor, intersection, and traffic confirmation attacks. {%- endtrans %}</p> - <p>{% trans -%} -Tor's support for a second tier of "onion proxies" does offer a non-trivial -degree of anonymity while requiring a low cost of entry, while I2P will not -offer this topology until <a href="#future.restricted">2.0</a>. -{%- endtrans %}</p> <p>{% trans -%} On the whole, Tor and I2P complement each other in their focus - Tor works @@ -881,20 +878,6 @@ Freenet team will pursue efforts in that direction, if not simply reusing (or helping to improve, as necessary) existing mixnets like I2P or Tor. {%- endtrans %}</p> - <p>{% trans -%} -It is worth mentioning that there has recently been discussion and work -by the Freenet developers on a "globally scalable darknet" using restricted -routes between peers of various trust. While insufficient information has -been made publicly available regarding how such a system would operate for -a full review, from what has been said the anonymity and scalability claims -seem highly dubious. In particular, the appropriateness for use in hostile -regimes against state level adversaries has been tremendously overstated, -and any analysis on the implications of resource scarcity upon the scalability -of the network has seemingly been avoided. Further questions regarding susceptibility -to traffic analysis, trust and other topics do exist, but a more in-depth -review of this "globally scalable darknet" will have to wait until the Freenet -team makes more information available. -{%- endtrans %}</p> <h1 id="app">Appendix A: Application layer</h1> <p>{% trans -%} @@ -1076,9 +1059,7 @@ to delivery through the mail.i2p outproxies, which are separate from the mail.i2 SMTP and POP3 servers - both the outproxies and inproxies communicate with the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those non-anonymous locations does not give access to the mail accounts or activity -patterns of the user. At the moment the developers work on a decentralized -mailsystem, called "v2mail". More information can be found on the I2P Site -<a href="http://{{ postman }}/">{{ postman }}</a>. +patterns of the user. {%- endtrans %}</p>