On Fri, Jul 4, 2014 at 6:02 PM, Paweł Zegartowski <pze...@gmail.com> wrote: > I2P (aka Invisible Internet Protocol) is designed to be "a real undernet" > Using I2P to acces a "standard" Internet but in anonymous way is much less
Right, in the likely context of the subject exploit, I referred only to the similar .onion/.i2p hidden constructs that available for users. Binding to and using them is a bit different of course but it all works. And the .i2p's are generally as 'efficient' (speedy) in use regarding initial connect, latency and bandwidth, if not better. (A lot of filesharing is on i2p.) Bootstrapping into the net does take a while though. And of course as with any other darknet you should run a 'non-exit' relay to help out. i2p does have 'exits' you can compare to tor as well. Anyone can run an exit. But users have first find one on a wiki list or somesuch, and then manually configure their i2p to use it. Consider it like a bolt on proxy. Last I checked one comes preconfigured but as such expect it to be far overloaded. No reason there can't be many, there just aren't. > http://geti2p.net/en/comparison/tor -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk