Cleanup, W3C XHTML 1.1 compatibility:
* Lowercase tags (ul and h2) * Fixed 'img' tags - added alt attribute, added terminator ('/>') * Removed the Wiki link brackets around [attack] (ugha)
This commit is contained in:
@@ -1,26 +1,23 @@
|
||||
<p>
|
||||
There are a great many other applications and projects working on anonymous
|
||||
<p>There are a great many other applications and projects working on anonymous
|
||||
communication and I2P has been inspired by much of their efforts. This is not
|
||||
a comprehensive list of anonymity resources - both freehaven's
|
||||
<a href="http://freehaven.net/anonbib/topic.html">Anonymity Bibliography</a>
|
||||
and GNUnet's <a href="http://www.ovmj.org/GNUnet/links.php3">related projects</a> serve
|
||||
that purpose well. That said, a few systems stand out for further comparison:</p>
|
||||
|
||||
<UL>
|
||||
<li> Morphmix and Tarzan
|
||||
<li> TOR / Onion Routing
|
||||
<li> Mixminion / Mixmaster
|
||||
<li> Freenet
|
||||
<li> JAP
|
||||
</UL>
|
||||
|
||||
<H2>Morphmix and Tarzan</H2>
|
||||
and GNUnet's <a href="http://www.ovmj.org/GNUnet/links.php3">related projects</a>
|
||||
serve that purpose well. That said, a few systems stand out for further
|
||||
comparison:</p>
|
||||
<ul>
|
||||
<li>Morphmix and Tarzan</li>
|
||||
<li>TOR / Onion Routing</li>
|
||||
<li>Mixminion / Mixmaster</li>
|
||||
<li>Freenet</li>
|
||||
<li>JAP</li>
|
||||
</ul>
|
||||
|
||||
<h2>Morphmix and Tarzan</h2>
|
||||
<i><a href="http://www.tik.ee.ethz.ch/~morphmix/">[Morphmix]</a>
|
||||
<a href="http://www.pdos.lcs.mit.edu/tarzan/">[Tarzan]</a></i>
|
||||
|
||||
<p>
|
||||
Morphmix and Tarzan are both fully distributed, peer to peer networks of
|
||||
<p>Morphmix and Tarzan are both fully distributed, peer to peer networks of
|
||||
anonymizing proxies, allowing people to tunnel out through the low latency
|
||||
mix network. Morphmix includes some very interesting collusion detection
|
||||
algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP
|
||||
@@ -29,14 +26,12 @@ these systems and I2P are related to I2P's <a href="how_threatmodel">threat mode
|
||||
and their out-proxy design (as opposed to providing both sender and receiver
|
||||
anonymity). There is source code available to both systems, but we are not aware
|
||||
of their use outside of academic environments.</p>
|
||||
<p>
|
||||
Stealing quite directly from the Tarzan paper, the following includes a quick
|
||||
<p>Stealing quite directly from the Tarzan paper, the following includes a quick
|
||||
comparison of Tarzan, Crowds, Onion Routing (OR), and I2P:</p>
|
||||
|
||||
<img src="http://dev.i2p.net/~jrandom/wiki/comparison.png">
|
||||
|
||||
<H2>TOR / Onion Routing</H2>
|
||||
<img src="http://dev.i2p.net/~jrandom/wiki/comparison.png" alt="Anonymous networks comparsion" />
|
||||
|
||||
<h2>TOR / Onion Routing</h2>
|
||||
<i><a href="http://freehaven.net/tor/">[TOR]</a>
|
||||
<a href="http://www.onion-router.net">[Onion Routing]</a></i>
|
||||
<p>
|
||||
@@ -73,8 +68,7 @@ database</a> and <a href="how_peerselection">peer selection</a>.</p>
|
||||
<li>TOR is written in C while I2P is written in Java</li>
|
||||
</ul>
|
||||
|
||||
<H2>Mixminion / Mixmaster</H2>
|
||||
|
||||
<h2>Mixminion / Mixmaster</h2>
|
||||
<i><a href="http://mixminion.net/">[Mixminion]</a>
|
||||
<a href="http://mixmaster.sourceforge.net/">[Mixmaster]</a></i>
|
||||
|
||||
@@ -85,8 +79,7 @@ model as we reach I2P 3.0 along side the needs of low latency users, providing
|
||||
a significantly larger anonymity set. As with TOR and Onion Routing above,
|
||||
both Mixminion and Mixmaster take the directory based approach as well.</p>
|
||||
|
||||
<H2>Freenet</H2>
|
||||
|
||||
<h2>Freenet</h2>
|
||||
<i><a href="http://freenetproject.org/">[Freenet]</a></i>
|
||||
<p>
|
||||
Freenet is a fully distributed, peer to peer anonymous publishing network.
|
||||
@@ -99,8 +92,7 @@ attacks. In addition, there seem to be some performance issues that can arguabl
|
||||
be attributed to the global blackboard model which will likely rule out interactive
|
||||
low latency communication.</p>
|
||||
|
||||
<H2>JAP</H2>
|
||||
|
||||
<h2>JAP</h2>
|
||||
<i><a href="http://anon.inf.tu-dresden.de/index_en.html">[JAP]</a></i>
|
||||
|
||||
<p>
|
||||
@@ -113,7 +105,7 @@ are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One
|
||||
caution to note is that anyone under the jurisdiction of the German courts may want
|
||||
to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has has
|
||||
successfully mounted an
|
||||
<a href="http://www.datenschutzzentrum.de/material/themen/presse/anonip3_e.htm">[attack]</a>
|
||||
<a href="http://www.datenschutzzentrum.de/material/themen/presse/anonip3_e.htm">attack</a>
|
||||
on the network. Even though the method of this attack was later found to be illegal
|
||||
in the German courts, the fact that the data was successfully collected is the
|
||||
concern. Courts change their minds based upon circumstance, and this is evidence that
|
||||
|
Reference in New Issue
Block a user