I2P Address: [http://git.idk.i2p]

Skip to content
Snippets Groups Projects
Commit e0a9ab3f authored by zzz's avatar zzz
Browse files

update research page

parent 1d729179
No related branches found
No related tags found
No related merge requests found
{% extends "global/layout.html" %}
{% block title %}{{ _('Academic Research') }}{% endblock %}
{% block lastupdated %}{% trans %}February 2016{% endtrans %}{% endblock %}
{% block content %}
<p>{% trans -%}
Academic research and analysis of I2P is an important part of ensuring that the software and network performs as expected and is safe for users in hostile environments.
{%- endtrans %}</p>
<p>{% trans torg='https://blog.torproject.org/blog/ethical-tor-research-guidelines' %}
Recent events have prompted anonymity projects to provide specific guidelines
for responsible research.
We endorse the <a href="{{ torg }}">Tor Ethical Research Guidelines</a> and incorporate them here.
Please follow the Tor guidelines when researching I2P as well.
{% endtrans %}</p>
<p>{% trans anonbib='http://freehaven.net/anonbib/' %}
There is a large research community investigating a wide range of aspects of
anonymity. For a current and comprehensive list of relevant papers, see the
......@@ -19,6 +27,10 @@ original research.
A list of known published papers about I2P is available <a href="{{ papers }}">here</a>.
{%- endtrans %}</p>
<p>{% trans torr='https://research.torproject.org/' %}
See also the <a href="{{ torr }}">Tor Research Home Page</a> for general guidance and links.
{% endtrans %}</p>
<h2>{{ _('Testing Attacks on I2P') }}</h2>
<p>{% trans -%}
......@@ -43,4 +55,27 @@ Additionally, I2P can be started in a virtual network mode. This mode disables a
<p>{% trans contact=site_url('contact') -%}
If you are planning on conducting research on the live I2P network, please <a href="{{ contact }}">contact us</a> before you commence your testing. While we do not discourage researchers from responsibly testing their ideas on the live network, if an attack becomes apparent and we don't have any line of communication then we will end up taking countermeasures which could interfere with the test.
{%- endtrans %}</p>
<h3>{{ _('Router Family Configuration') }}</h3>
<p>{% trans -%}
As of release 0.9.25, I2P supports a router family configuration.
This provides researchers who run multiple routers with the means to publicly identify those routers.
In turn, this helps the I2P project understand that these routers are not running an attack on the network.
It also will prevent other routers from including multiple routers of the family in a single tunnel,
which could lead to deanonymization.
Routers that appear to be colluding but do not have a declared family may be assumed to
be an attack on the network, and may be blocked.
The best way to ensure the success of your research project is to work with us.
{%- endtrans %}</p>
<p>{% trans -%}
A router family shares a private key so that participation in the family cannot be spoofed.
To configure a router family, click on the 'I2P Internals' link in the router console,
and then on the 'Family' tab.
Follow the instructions there to generate the private key for the first router in the family.
Then, export the key from that router, and import it to other members of the family.
{%- endtrans %}</p>
{% endblock %}
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment