Hi,

> There should be a disclaimer somewhere that Tor is a competitor to
> I2P, is far from perfect itself (actually has a few glaring
> weaknesses, such as exit nodes), and the guy critiquing I2P works for
> Tor.

The guys who did the PETS 2011 attack on I2P are not with Tor, but with
GNUNet -- an absolutely underrated project whose principal problem is
deployment. And the goal is not competition as in market share, but
competition as in healthy disclosure of weaknesses. That said, behind
every project there is an ego.

I'd be happy so see more people have a look at GNUNet:

https://www.gnunet.org/

Disclaimer: The GNUNet guys are my friends; but I am not a GNUNet
developer myself. Until I'm Grothoff'ed, as so many have been before.
Insider joke.

-- 
Ralph Holz
I8 - Network Architectures and Services
Technische Universität München
http://www.net.in.tum.de/de/mitarbeiter/holz/
Phone +49.89.289.18043
PGP: A805 D19C E23E 6BBB E0C4  86DC 520E 0C83 69B0 03EF
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to