danger/u/
This thread is permanently archived
I2P vs TOR

| How does I2P stand up against tor? Do similar analysis attacks work for i2p? I did a little googling but didn't get any strong answers


| https://youtu.be/nBjg2TN6D2g haven't watched the vid, but literally the first fucking result from searching I2P.


| >>513149 that was totally fucking useless


| Obviously attacks against the user like behavioral fingerprinting are shared across technologies, but what about malicious nodes? That's kind of what I'm asking


| Who are you? When do you want to know this? Where are you from? Why do you want to know? How do you plan on using the answer once you know it?


| Where did you come from? Where did you go? Where did you come from cotton eye Joe?


| I'm not planning on using I2P or anything, I'm just curious about the the technology.

Total number of posts: 7, last modified on: Mon Jan 1 00:00:00 1544653370

This thread is permanently archived