Cleanup, W3C XHTML 1.1 compatibility:

* Lowercase tags (ul and h2)
 * Fixed 'img' tags - added alt attribute, added terminator ('/>')
 * Removed the Wiki link brackets around [attack]
(ugha)
This commit is contained in:
ugha
2004-07-24 00:04:48 +00:00
committed by zzz
parent c1be77a643
commit 4887823361

View File

@@ -1,26 +1,23 @@
<p> <p>There are a great many other applications and projects working on anonymous
There are a great many other applications and projects working on anonymous
communication and I2P has been inspired by much of their efforts. This is not communication and I2P has been inspired by much of their efforts. This is not
a comprehensive list of anonymity resources - both freehaven's a comprehensive list of anonymity resources - both freehaven's
<a href="http://freehaven.net/anonbib/topic.html">Anonymity Bibliography</a> <a href="http://freehaven.net/anonbib/topic.html">Anonymity Bibliography</a>
and GNUnet's <a href="http://www.ovmj.org/GNUnet/links.php3">related projects</a> serve and GNUnet's <a href="http://www.ovmj.org/GNUnet/links.php3">related projects</a>
that purpose well. That said, a few systems stand out for further comparison:</p> serve that purpose well. That said, a few systems stand out for further
comparison:</p>
<UL> <ul>
<li> Morphmix and Tarzan <li>Morphmix and Tarzan</li>
<li> TOR / Onion Routing <li>TOR / Onion Routing</li>
<li> Mixminion / Mixmaster <li>Mixminion / Mixmaster</li>
<li> Freenet <li>Freenet</li>
<li> JAP <li>JAP</li>
</UL> </ul>
<H2>Morphmix and Tarzan</H2>
<h2>Morphmix and Tarzan</h2>
<i><a href="http://www.tik.ee.ethz.ch/~morphmix/">[Morphmix]</a> <i><a href="http://www.tik.ee.ethz.ch/~morphmix/">[Morphmix]</a>
<a href="http://www.pdos.lcs.mit.edu/tarzan/">[Tarzan]</a></i> <a href="http://www.pdos.lcs.mit.edu/tarzan/">[Tarzan]</a></i>
<p> <p>Morphmix and Tarzan are both fully distributed, peer to peer networks of
Morphmix and Tarzan are both fully distributed, peer to peer networks of
anonymizing proxies, allowing people to tunnel out through the low latency anonymizing proxies, allowing people to tunnel out through the low latency
mix network. Morphmix includes some very interesting collusion detection mix network. Morphmix includes some very interesting collusion detection
algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP
@@ -29,14 +26,12 @@ these systems and I2P are related to I2P's <a href="how_threatmodel">threat mode
and their out-proxy design (as opposed to providing both sender and receiver and their out-proxy design (as opposed to providing both sender and receiver
anonymity). There is source code available to both systems, but we are not aware anonymity). There is source code available to both systems, but we are not aware
of their use outside of academic environments.</p> of their use outside of academic environments.</p>
<p> <p>Stealing quite directly from the Tarzan paper, the following includes a quick
Stealing quite directly from the Tarzan paper, the following includes a quick
comparison of Tarzan, Crowds, Onion Routing (OR), and I2P:</p> comparison of Tarzan, Crowds, Onion Routing (OR), and I2P:</p>
<img src="http://dev.i2p.net/~jrandom/wiki/comparison.png"> <img src="http://dev.i2p.net/~jrandom/wiki/comparison.png" alt="Anonymous networks comparsion" />
<H2>TOR / Onion Routing</H2>
<h2>TOR / Onion Routing</h2>
<i><a href="http://freehaven.net/tor/">[TOR]</a> <i><a href="http://freehaven.net/tor/">[TOR]</a>
<a href="http://www.onion-router.net">[Onion Routing]</a></i> <a href="http://www.onion-router.net">[Onion Routing]</a></i>
<p> <p>
@@ -73,8 +68,7 @@ database</a> and <a href="how_peerselection">peer selection</a>.</p>
<li>TOR is written in C while I2P is written in Java</li> <li>TOR is written in C while I2P is written in Java</li>
</ul> </ul>
<H2>Mixminion / Mixmaster</H2> <h2>Mixminion / Mixmaster</h2>
<i><a href="http://mixminion.net/">[Mixminion]</a> <i><a href="http://mixminion.net/">[Mixminion]</a>
<a href="http://mixmaster.sourceforge.net/">[Mixmaster]</a></i> <a href="http://mixmaster.sourceforge.net/">[Mixmaster]</a></i>
@@ -85,8 +79,7 @@ model as we reach I2P 3.0 along side the needs of low latency users, providing
a significantly larger anonymity set. As with TOR and Onion Routing above, a significantly larger anonymity set. As with TOR and Onion Routing above,
both Mixminion and Mixmaster take the directory based approach as well.</p> both Mixminion and Mixmaster take the directory based approach as well.</p>
<H2>Freenet</H2> <h2>Freenet</h2>
<i><a href="http://freenetproject.org/">[Freenet]</a></i> <i><a href="http://freenetproject.org/">[Freenet]</a></i>
<p> <p>
Freenet is a fully distributed, peer to peer anonymous publishing network. Freenet is a fully distributed, peer to peer anonymous publishing network.
@@ -99,8 +92,7 @@ attacks. In addition, there seem to be some performance issues that can arguabl
be attributed to the global blackboard model which will likely rule out interactive be attributed to the global blackboard model which will likely rule out interactive
low latency communication.</p> low latency communication.</p>
<H2>JAP</H2> <h2>JAP</h2>
<i><a href="http://anon.inf.tu-dresden.de/index_en.html">[JAP]</a></i> <i><a href="http://anon.inf.tu-dresden.de/index_en.html">[JAP]</a></i>
<p> <p>
@@ -113,7 +105,7 @@ are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One
caution to note is that anyone under the jurisdiction of the German courts may want caution to note is that anyone under the jurisdiction of the German courts may want
to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has has to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has has
successfully mounted an successfully mounted an
<a href="http://www.datenschutzzentrum.de/material/themen/presse/anonip3_e.htm">[attack]</a> <a href="http://www.datenschutzzentrum.de/material/themen/presse/anonip3_e.htm">attack</a>
on the network. Even though the method of this attack was later found to be illegal on the network. Even though the method of this attack was later found to be illegal
in the German courts, the fact that the data was successfully collected is the in the German courts, the fact that the data was successfully collected is the
concern. Courts change their minds based upon circumstance, and this is evidence that concern. Courts change their minds based upon circumstance, and this is evidence that