Hi, > There should be a disclaimer somewhere that Tor is a competitor to > I2P, is far from perfect itself (actually has a few glaring > weaknesses, such as exit nodes), and the guy critiquing I2P works for > Tor.
The guys who did the PETS 2011 attack on I2P are not with Tor, but with GNUNet -- an absolutely underrated project whose principal problem is deployment. And the goal is not competition as in market share, but competition as in healthy disclosure of weaknesses. That said, behind every project there is an ego. I'd be happy so see more people have a look at GNUNet: https://www.gnunet.org/ Disclaimer: The GNUNet guys are my friends; but I am not a GNUNet developer myself. Until I'm Grothoff'ed, as so many have been before. Insider joke. -- Ralph Holz I8 - Network Architectures and Services Technische Universität München http://www.net.in.tum.de/de/mitarbeiter/holz/ Phone +49.89.289.18043 PGP: A805 D19C E23E 6BBB E0C4 86DC 520E 0C83 69B0 03EF _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography