I did. :grin:Hi strix, If you saw an attack maybe it would be wise to send a dev a private message about it to make sure they see it quickly
I think it is more than that. It has the onion routing part besides being p2p.This is probably another dumb question, but couldn't the entire DRK system be run as a single large vpn? Is that what a P2P network is? Is this what TOR is?
This is a better read: http://resources.infosecinstitute.com/anonymizing-networks-tor-vs-i2p/I think everyone in the discussion of Tor/I2P should read this if he/she hasn't done yet:
https://geti2p.net/en/comparison/tor
EDIT: Perhaps, darkcoin developers can work with I2Pd developers. I thought they were interested in having their own cryptocurrency. They may be interested in working with Evan.
On a side note, IRC Freenode network does not offer an I2P service, because according to one of the staff members there that, "using an i2p gateway to connect to us (the network) will present the same risks of snooping and other attacks as using exit nodes."I believe that despite the fact that I2P has existed about a decade, it is very under-utilized, the presence of a limited community represents in my opinion a brake on its growth.
I have used both and I found both efficiency effective. I tried also to sniff a package using specific software with the intent to disclose navigation data or any reference to the user’s identity, of course without success.
The success of anonymizing a network is related to their diffusion, and without doubt Tor is a step forward, and the more users have access to sharing resources, the faster will be the navigation.
This is a better read: http://resources.infosecinstitute.com/anonymizing-networks-tor-vs-i2p/
To sum up, I'd just quote the author's conclusion here:
On a side note, IRC Freenode network does not offer an I2P service, because according to one of the staff members there that, "using an i2p gateway to connect to us (the network) will present the same risks of snooping and other attacks as using exit nodes."
You're reading from an I2P site, of course it has to say it's better. Try to find an objective view, old or new. Sure things could have been changed the last two years but it still depends on the number of users and exit nodes that I2P has less than Tor. I don't know for sure but from a few sites this is the info I've got.Haven't read it yet but that article is kind of old. Both Tor and I2P have changed quite a bit from 2 yrs ago. I just want to highlight the differences that may be important to us:
Centralized control vs Fully distributed,
Optimized for hidden services,
Bandwidth overhead of being a full peer,
(... fill in whatever you think appropriate)
I agree that they may be biased on which is better. However, the differences in design choice can be simple facts. For example, centralized control may prove a point for those against Tor for NSA-like reason. Another example is 'Floodfill peers ("directory servers") are varying and untrusted, rather than hardcoded'. Those are just simple facts about their design choice.You're reading from an I2P site, of course it has to say it's better. Try to find an objective view, old or new. Sure things could have been changed the last two years but it still depends on the number of users and exit nodes that I2P has less than Tor. I don't know for sure but from a few sites this is the info I've got.
You're reading from an I2P site, of course it has to say it's better. Try to find an objective view, old or new. Sure things could have been changed the last two years but it still depends on the number of users and exit nodes that I2P has less than Tor. I don't know for sure but from a few sites this is the info I've got.
Then why is it that I2P hasn't gained much user base like Tor?I2P is not lying on their site.
The biggest difference from I2P and Tor is that I2P supports UDP protocol.
I2P is designed to be used as a hidden service not an out-proxy. I2P developers actually recommend Tor for using as an outproxy.
Tor compared to I2P... Tor developers are wasting the funding they get. I2P has none to very little funding and have done a way better job. Tor developers get paid millions of dollars. I wish all this cash would go to I2P developers because they really do deserve it.
But yeah.. Tor is centralized because directory auth servers are indeed hardcoded and if Tor developers stop running them then Tor dies yet I2P lives on without anyone.
Then why is it that I2P hasn't gained much user base like Tor?
As I get it: looks like more users want to use out-proxies to get to restricted Internet services or simply staying anonymous in Internet than to use "in-proxies" to get to hidden services.....
I2P is designed to be used as a hidden service not an out-proxy. I2P developers actually recommend Tor for using as an outproxy.
...
So... which one is it that you devs have decided to use? Tor or I2P hidden services?As I get it: looks like more users want to use out-proxies to get to restricted Internet services or simply staying anonymous in Internet than to use "in-proxies" to get to hidden services.
And btw by that description I feel like I2P could suit us more - MNs network is a service actually.
No idea :tongue: Actually I'm focusing on some internal optimizations now.So... which one is it that you devs have decided to use? Tor or I2P hidden services?
EDIT: Can we use both? Plus our own VPNs, we'll be really in the dark! :grin:
I don't understand all of the tech nitty gritty in the discussion but I've learned a lot and appreciate everyone's input here too.No idea :tongue: Actually I'm focusing on some internal optimizations now.
But I have to say that this brainstorming is very interesting and I already learned a lot following this discussion and provided links (tnx everyone:wink. I can't say that I understand everything that I read there though...
I think it still a subject to discuss/test and we have some time hopefully so decision won't happen overnight :smile:
We're lucky to have you. Thanks for all you've been doing! :smile:[19:40:51] <GNULinuxGuy> Udjin is on a roll today too.. good stuff
[19:41:39] <moli> GNULinuxGuy: where
[19:41:52] <moli> udjin must be evan's twin brother.. lol
[19:42:11] <GNULinuxGuy> https://github.com/darkcoin/darkcoin/commits/v0.11.2.x
[19:42:31] <Jeff8247> this is why i only use btc/drk
[19:42:37] <Jeff8247> these guys are machines
LOL Thanks! I'm glad to be here too :smile:I don't understand all of the tech nitty gritty in the discussion but I've learned a lot and appreciate everyone's input here too.
Btw, we were talking about you in IRC a little while ago...
We're lucky to have you. Thanks for all you've been doing! :smile:
I think we do not have a lot of resources to have both Tor and I2P because we need to consider the maintenance. So, it will be good to have a testing phase of both. For instance, first round on Tor and second round on I2P with the same number of participants. Need to take the smaller number of nodes on I2P in the comparison of results.So... which one is it that you devs have decided to use? Tor or I2P hidden services?
EDIT: Can we use both? Plus our own VPNs, we'll be really in the dark! :grin: