-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Eugen Leitl wrote: > Anyone running it? Any good? (I only do Tor). > > http://www.i2p2.de/release-0.7.2 > > I2P release 0.7.2 > ===================== > > The 0.7.2 release fixes multiple bugs and potential problems > in I2P, while preparing ground for new functionality. > > Threading issues with the SimpleTimer class should no longer occur, > the NTCP transport should no longer encounter null pointer exceptions, > and "abandoned" tunnels should finish operation correctly. > > Support is added for accessing the Router Console over IPv6, > a new message type enables I2CP applications to query > the router's bandwidth limits, an experimental desktop interface > for managing the router is included for the first time > (but not enabled automatically yet) and participation of a single peer > in too many tunnels is prevented to improve reliability and safety. > > Besides other maintenance work, several old statistics calculators > are dropped to make router profiles smaller and quicker, while > new build scripts are supplied for I2P's big integer math library. > Updating is highly recommended. > > As customary, for people who don't have the option > of checking GPG signatures, supplied below are the > SHA1 hashes of released files: > > 068512a688a793ee8ad55e4de8fd82417d4d9f98 i2pheadless-0.7.2.tar.bz2 > 1f7376855f69c6f0a663d4b4128260a41a09b602 i2pinstall-0.7.2.exe > 83e2a63db3d0a5db8e610df9e52ad538febe5e6d i2psource-0.7.2.tar.bz2 > febe153072a107c6aa285d51f20217d90531644c i2pupdate-0.7.2.zip > b7313803bba86432f895a215096fb472d2677689 i2pupdate.sud > > Best wishes, > Complication.
I2P is significanly better than Tor imho, mostly because it does not rely on people's altruism to run the relay nodes, but rather gets people to participate if they want to access the content. This in turn has the positive side-effect of making it harder to determine your content, as you will be forwarding the content of others and thus downloading it. I2P does still have problem with things like correlation attacks, and it's support of exit nodes is rather small (because there it does rely on altruism and willingness to answer to authorities when something traceable and illegal will go through your node). I don't really see how I2P will ever be able to deal with the correlation attack and remain a real-life communication medium; personally i am behind the approach that the Freenet Project has taken with the distributed datastore, which (although makes it much harder to have dynamic content) makes it impossible to determine the server of the information based upon the up/down time patterns. Having said that it's a bit unfair to compare Tor, I2P, and Freenet; as their goals differ significantly. For Tor internal servers (onion sites) is an add-on, while I2P is living on eepsites (.i2p), and Freenet has the goal of censorship resistance as well as anonymity. - Volodya - -- http://freedom.libsyn.com/ Echo of Freedom, Radical Podcast http://eng.anarchopedia.org/ Anarchopedia, A Free Knowledge Portal http://www.freedomporn.org/ Freedom Porn, anarchist and activist smut "None of us are free until all of us are free." ~ Mihail Bakunin -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAknteVcACgkQuWy2EFICg+354gCg4VTXXG5Ly3TwGAqcBdS0w9eS nk8AoLi9W1OTEBB6oL+BiLBmFunFmAjB =/b5R -----END PGP SIGNATURE----- _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers