Cleanup, W3C XHTML 1.1 compatibility:

* Lowercase tags (ul and h2)
 * Fixed 'img' tags - added alt attribute, added terminator ('/>')
 * Removed the Wiki link brackets around [attack]
(ugha)
This commit is contained in:
ugha
2004-07-24 00:04:48 +00:00
committed by zzz
parent c1be77a643
commit 4887823361

View File

@@ -1,26 +1,23 @@
<p>
There are a great many other applications and projects working on anonymous
<p>There are a great many other applications and projects working on anonymous
communication and I2P has been inspired by much of their efforts. This is not
a comprehensive list of anonymity resources - both freehaven's
<a href="http://freehaven.net/anonbib/topic.html">Anonymity Bibliography</a>
and GNUnet's <a href="http://www.ovmj.org/GNUnet/links.php3">related projects</a> serve
that purpose well. That said, a few systems stand out for further comparison:</p>
<UL>
<li> Morphmix and Tarzan
<li> TOR / Onion Routing
<li> Mixminion / Mixmaster
<li> Freenet
<li> JAP
</UL>
<H2>Morphmix and Tarzan</H2>
and GNUnet's <a href="http://www.ovmj.org/GNUnet/links.php3">related projects</a>
serve that purpose well. That said, a few systems stand out for further
comparison:</p>
<ul>
<li>Morphmix and Tarzan</li>
<li>TOR / Onion Routing</li>
<li>Mixminion / Mixmaster</li>
<li>Freenet</li>
<li>JAP</li>
</ul>
<h2>Morphmix and Tarzan</h2>
<i><a href="http://www.tik.ee.ethz.ch/~morphmix/">[Morphmix]</a>
<a href="http://www.pdos.lcs.mit.edu/tarzan/">[Tarzan]</a></i>
<p>
Morphmix and Tarzan are both fully distributed, peer to peer networks of
<p>Morphmix and Tarzan are both fully distributed, peer to peer networks of
anonymizing proxies, allowing people to tunnel out through the low latency
mix network. Morphmix includes some very interesting collusion detection
algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP
@@ -29,14 +26,12 @@ these systems and I2P are related to I2P's <a href="how_threatmodel">threat mode
and their out-proxy design (as opposed to providing both sender and receiver
anonymity). There is source code available to both systems, but we are not aware
of their use outside of academic environments.</p>
<p>
Stealing quite directly from the Tarzan paper, the following includes a quick
<p>Stealing quite directly from the Tarzan paper, the following includes a quick
comparison of Tarzan, Crowds, Onion Routing (OR), and I2P:</p>
<img src="http://dev.i2p.net/~jrandom/wiki/comparison.png">
<H2>TOR / Onion Routing</H2>
<img src="http://dev.i2p.net/~jrandom/wiki/comparison.png" alt="Anonymous networks comparsion" />
<h2>TOR / Onion Routing</h2>
<i><a href="http://freehaven.net/tor/">[TOR]</a>
<a href="http://www.onion-router.net">[Onion Routing]</a></i>
<p>
@@ -73,8 +68,7 @@ database</a> and <a href="how_peerselection">peer selection</a>.</p>
<li>TOR is written in C while I2P is written in Java</li>
</ul>
<H2>Mixminion / Mixmaster</H2>
<h2>Mixminion / Mixmaster</h2>
<i><a href="http://mixminion.net/">[Mixminion]</a>
<a href="http://mixmaster.sourceforge.net/">[Mixmaster]</a></i>
@@ -85,8 +79,7 @@ model as we reach I2P 3.0 along side the needs of low latency users, providing
a significantly larger anonymity set. As with TOR and Onion Routing above,
both Mixminion and Mixmaster take the directory based approach as well.</p>
<H2>Freenet</H2>
<h2>Freenet</h2>
<i><a href="http://freenetproject.org/">[Freenet]</a></i>
<p>
Freenet is a fully distributed, peer to peer anonymous publishing network.
@@ -99,8 +92,7 @@ attacks. In addition, there seem to be some performance issues that can arguabl
be attributed to the global blackboard model which will likely rule out interactive
low latency communication.</p>
<H2>JAP</H2>
<h2>JAP</h2>
<i><a href="http://anon.inf.tu-dresden.de/index_en.html">[JAP]</a></i>
<p>
@@ -113,7 +105,7 @@ are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One
caution to note is that anyone under the jurisdiction of the German courts may want
to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has has
successfully mounted an
<a href="http://www.datenschutzzentrum.de/material/themen/presse/anonip3_e.htm">[attack]</a>
<a href="http://www.datenschutzzentrum.de/material/themen/presse/anonip3_e.htm">attack</a>
on the network. Even though the method of this attack was later found to be illegal
in the German courts, the fact that the data was successfully collected is the
concern. Courts change their minds based upon circumstance, and this is evidence that