Post number #513083, ID: 080e16
|
How does I2P stand up against tor? Do similar analysis attacks work for i2p? I did a little googling but didn't get any strong answers
Post number #513149, ID: 2a0581
|
https://youtu.be/nBjg2TN6D2g haven't watched the vid, but literally the first fucking result from searching I2P.
Post number #513489, ID: 080e16
|
>>513149 that was totally fucking useless
Post number #513491, ID: 080e16
|
Obviously attacks against the user like behavioral fingerprinting are shared across technologies, but what about malicious nodes? That's kind of what I'm asking
Post number #513592, ID: acc753
|
Who are you? When do you want to know this? Where are you from? Why do you want to know? How do you plan on using the answer once you know it?
Post number #513606, ID: 40de2a
|
Where did you come from? Where did you go? Where did you come from cotton eye Joe?
Post number #513608, ID: 080e16
|
I'm not planning on using I2P or anything, I'm just curious about the the technology.
Total number of posts: 7,
last modified on:
Mon Jan 1 00:00:00 1544653370
| How does I2P stand up against tor? Do similar analysis attacks work for i2p? I did a little googling but didn't get any strong answers