• MigratingtoLemmy@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        2 hours ago

        Confirmed the troll.

        From the FAQ:

        Before you use I2P, use Basic Computer Hygiene Always! Apply your OS vendor provided software updates in a prompt manner. Be aware of the state of your firewall and anti-virus status if you use one. Always get your software from authentic sources.

        It may be dangerous to use I2P in what the project calls “Strict Countries”

        Most I2P peers are not in those strict countries and the ones that are, are placed in “Hidden Mode” where they interact with the rest of the network in more limited ways, so that they are less visible to network observers.

        Unlike Tor, “exit nodes” - or “outproxies” as they are referred to on the I2P network - are not an inherent part of the network. Only volunteers who specifically set up and run separate applications will relay traffic to the regular Internet. There are very, very few of these.

        There is an outproxy guide available on our forums, if you would like to learn more about running an outproxy.

        If you are hosting something sensitive, then your services will go down at the same time that your router goes down. Someone who observes your downtime and correlates it to real-world events could probably de-anonymize you with enough effort.

        I2P has defenses available against this like multihoming or Tahoe-LAFS

        I2P does not encrypt the Internet, neither does Tor - for example, through Transport Layer Security (TLS). I2P and Tor both aim to transport your traffic as-is securely and anonymously over the corresponding network, to its destination.

        In addition, you may be vulnerable to collusion between the outproxy operator and operators of other I2P services, if you use the same tunnels (“shared clients”).

        In theory, if you’re accessing the clearnet, then it is no better or worse than TOR. It is a little better if you’re stay in I2P land.

        Don’t listen to me or him. If you’re reading this, go to the FAQ (https://geti2p.net/en/faq) and make your own decisions.

      • C126@sh.itjust.works
        link
        fedilink
        arrow-up
        7
        arrow-down
        1
        ·
        9 hours ago

        You linked an article that doesn’t say anything to back up your claim. Why do you say i2p is vulnerable to timing attacks?

        • ShortN0te@lemmy.ml
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          8 hours ago

          Garlic routing[1] is a variant of onion routing that encrypts multiple messages together to make it more difficult[2] for attackers to perform traffic analysis and to increase the speed of data transfer.[3]

          First sentence. Check up the linked article as source.

          • C126@sh.itjust.works
            link
            fedilink
            arrow-up
            2
            ·
            5 hours ago

            Ok, technically still vulnerable in the sense that if you transfer a huge file in excess of other parts of the bundle, it might be identifiable by a bad actor, but that’s really misleading, since i2p has a lot of built in logic that makes that scenario pretty unlikely.

            • ShortN0te@lemmy.ml
              link
              fedilink
              arrow-up
              2
              ·
              4 hours ago

              Not only huge files. At the end of the article the author goes on about changing the load or manipulating the timing of the traffic.

              For both you need to be part of the network and (to some degree) the traffic you want to trace needs to go through a node you are controlling if i understand it correctly. With increasing size it becomes more difficult.

        • ShortN0te@lemmy.ml
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          8 hours ago

          Garlic routing[1] is a variant of onion routing that encrypts multiple messages together to make it more difficult[2] for attackers to perform traffic analysis and to increase the speed of data transfer.[3]

          First sentence. Check up the linked article as source.