-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Eugen Leitl wrote:
> Anyone running it? Any good? (I only do Tor).
> 
> http://www.i2p2.de/release-0.7.2
> 
> I2P release 0.7.2
> =====================
> 
> The 0.7.2 release fixes multiple bugs and potential problems
> in I2P, while preparing ground for new functionality.
> 
> Threading issues with the SimpleTimer class should no longer occur,
> the NTCP transport should no longer encounter null pointer exceptions,
> and "abandoned" tunnels should finish operation correctly.
> 
> Support is added for accessing the Router Console over IPv6,
> a new message type enables I2CP applications to query
> the router's bandwidth limits, an experimental desktop interface
> for managing the router is included for the first time
> (but not enabled automatically yet) and participation of a single peer
> in too many tunnels is prevented to improve reliability and safety.
> 
> Besides other maintenance work, several old statistics calculators
> are dropped to make router profiles smaller and quicker, while
> new build scripts are supplied for I2P's big integer math library.
> Updating is highly recommended.
> 
> As customary, for people who don't have the option
> of checking GPG signatures, supplied below are the
> SHA1 hashes of released files:
> 
> 068512a688a793ee8ad55e4de8fd82417d4d9f98 i2pheadless-0.7.2.tar.bz2
> 1f7376855f69c6f0a663d4b4128260a41a09b602 i2pinstall-0.7.2.exe
> 83e2a63db3d0a5db8e610df9e52ad538febe5e6d i2psource-0.7.2.tar.bz2
> febe153072a107c6aa285d51f20217d90531644c i2pupdate-0.7.2.zip
> b7313803bba86432f895a215096fb472d2677689 i2pupdate.sud
> 
> Best wishes,
> Complication.

I2P is significanly better than Tor imho, mostly because it does not rely on
people's altruism to run the relay nodes, but rather gets people to participate
if they want to access the content. This in turn has the positive side-effect of
making it harder to determine your content, as you will be forwarding the
content of others and thus downloading it.

I2P does still have problem with things like correlation attacks, and it's
support of exit nodes is rather small (because there it does rely on altruism
and willingness to answer to authorities when something traceable and illegal
will go through your node). I don't really see how I2P will ever be able to deal
with the correlation attack and remain a real-life communication medium;
personally i am behind the approach that the Freenet Project has taken with the
distributed datastore, which (although makes it much harder to have dynamic
content) makes it impossible to determine the server of the information based
upon the up/down time patterns.

Having said that it's a bit unfair to compare Tor, I2P, and Freenet; as their
goals differ significantly. For Tor internal servers (onion sites) is an add-on,
while I2P is living on eepsites (.i2p), and Freenet has the goal of censorship
resistance as well as anonymity.

                       - Volodya

- --
http://freedom.libsyn.com/       Echo of Freedom, Radical Podcast
http://eng.anarchopedia.org/     Anarchopedia, A Free Knowledge Portal
http://www.freedomporn.org/      Freedom Porn, anarchist and activist smut

 "None of us are free until all of us are free."    ~ Mihail Bakunin
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAknteVcACgkQuWy2EFICg+354gCg4VTXXG5Ly3TwGAqcBdS0w9eS
nk8AoLi9W1OTEBB6oL+BiLBmFunFmAjB
=/b5R
-----END PGP SIGNATURE-----
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to