-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> > We have had NAT traversal for a while now.  It was described in
> > the SSU specs [1] that I sent to toad for comment sometime in
> > the early summer, and deployed in 0.6.0.6 [2].

> Well, I was basing this on: http://www.i2p.net/faq#ports, which says:
[snip]
> Is that information out of date?

Yes - as you can see, it also doesn't mention the UDP transport. I
haven't had time to work on the website, it'll be revamped later
this month though, I hope.

> I am sure we could all inform ourselves better about many things
> given sufficient time.

True indeed, but there aren't that many things going on in the
anonymity field - perhaps a dozen public projects past the "vague
idea" stage?  You've also shown that you don't follow the DHT
field either, as we discussed some pretty substantial theoretical
research last time, none of which you were familiar with.  What
efforts in the anonymity field do you follow?

> You are right, we didn't invent I2P here, because I2P doesn't meet
> our requirements, nor does anything that relies on a DHT for its
> operation.

I thought relying upon a DHT was something redundant, in your eyes,
as "Freenet is like a DHT", not something that failed to meet your
requirements.

Or are your requirements novelty?

> >I don't care about technology, I care about results.  What will
> >help real live people.
>
> Just not if they live in China, Saudi Arabia, Iran, or maybe even
> the UK several years from now...

Of course I care about them, but I'm only one person.  I've written
95% of the I2P SDK and router, and probably a third of the LOC in
the client apps, and I'm overwhelmed just doing what I do.  I can't
do everything for everybody all at once.

If Freenet were to run on top of I2P, the reuse made possible would
free up substantial resources (aka hours) across both teams,
allowing further improvement of the capacity to help those in
hostile regimes.  As I can't do it myself, I don't promote it
for such a use.

> you have provided no evidence that your approach is better suited
> to meeting the requirements we share.

What better evidence can I offer beyond working code?

You haven't even bothered to see what you're talking about.  This
is why I dismiss any notions that you've "seriously considered"
I2P, as you've never actually looked into it.  Have you actually
run any of the I2P releases put out in the last 2 years?

This, in turn, suggests to me that neither have you "seriously
considered" running over Tor.  Last I heard, the complaints being
stated about Tor were that "its centralized", without any regard
to the work that the Tor folks are making on decentralization.

"Serious consideration" means doing some work.  We've discussed in
this thread how I2P can offer the same level of operation that
Freenet/dark can, unless you're either disconnected from the
Internet or any notion of a free press is gone (as without the
ability to communicate anonymously, there is no free press).

The Freenet/0.7 algorithm is neat, but it also isn't too different
from the old CPA (only now there's a theoretical basis for it,
instead of a purely heuristic basis).  Not to diminish Oskar's and
your work on that research, from a practical point of view, it
doesn't change Freenet/light too much (and Freenet/dark is just
a different way of distributing references).

=jr
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDT9lMWYfZ3rPnHH0RAgaaAJ9Ux0IpPf6xFEuShQGDzOBsVv6X2QCfcC22
8JnB2JCCvHb3lmPD4D/64Ro=
=Sor5
-----END PGP SIGNATURE-----

Reply via email to