Cleaned up the file. Resolved links. Made XHTML compliant.

(ugha)
This commit is contained in:
ugha
2004-07-12 02:11:35 +00:00
committed by zzz
parent d008f7801d
commit 9458844abc

View File

@@ -1,45 +1,64 @@
<h1>FAQ</h1> <h1>FAQ</h1>
<h3>What is I2P?</h3> <h3>What is I2P?</h3>
<p>I2P is a generic anonymous and secure peer to peer communication layer. It is a network that sits on <p>
top of another network (in this case, it sits on top of the internet). It is responsible for delivering I2P is a generic anonymous and secure peer to peer communication layer. It is
a message anonymously and securely to another location. More tech details are a network that sits on top of another network (in this case, it sits on top of
<a href="/book/view/39?PHPSESSID=a8b251952f5a8f0b893e37f48a2c6f64">available</a></p> the internet). It is responsible for delivering a message anonymously and
securely to another location. More tech details are
<a href="how">available</a><!-- Not sure if I got this link right (ugha) -->
</p>
<h3>What does that mean?</h3> <h3>What does that mean?</h3>
<p>It means that you can do things anonymously and host services anonymously from your computer. <p>
You will need to use programs that are designed to work with I2P, though in some cases you can use It means that you can do things anonymously and host services anonymously from
regular internet programs with I2P by creating something called an your computer. You will need to use programs that are designed to work with
<a href="/i2ptunnel?PHPSESSID=a8b251952f5a8f0b893e37f48a2c6f64">I2PTunnel</a></p> I2P, though in some cases you can use regular internet programs with I2P by
creating something called an <a href="i2ptunnel">I2PTunnel</a>
</p>
<h3>What is the difference between I2P and the internet?</h3> <h3>What is the difference between I2P and the internet?</h3>
<p>Data transferred via I2P is anonymous and encrypted. Regular internet traffic is not <p>
(although it can be encrypted). If you set up a web page using I2P, nobody will know who Data transferred via I2P is anonymous and encrypted. Regular internet traffic
you are. If you browse a web page using I2P, nobody will know who you are. If you transfer is not (although it can be encrypted). If you set up a web page using I2P,
files using I2P, nobody will know who you are.</p> nobody will know who you are. If you browse a web page using I2P, nobody will
know who you are. If you transfer files using I2P, nobody will know who you
are.
</p>
<h3>Whats an "eepsite"?</h3> <h3>Whats an "eepsite"?</h3>
<p>An eepsite is a website that is hosted anonymously - you can access it by setting your web browser's HTTP proxy to use the web proxy (typically it listens on localhost port 4444), <p>
and browsing to the site.</p> An eepsite is a website that is hosted anonymously - you can access it by
setting your web browser's HTTP proxy to use the web proxy (typically it
listens on localhost port 4444), and browsing to the site.
</p>
<h3>Can I browse the web with I2P?</h3> <h3>Can I browse the web with I2P?</h3>
<p>Yes - the I2PTunnel eepproxy includes a hook to use an anonymously hosted outbound proxy <p>
(squid.i2p). If you have your browser set to use the web proxy, if you type Yes - the I2PTunnel eepproxy includes a hook to use an anonymously hosted
http://google.com/ your request will be routed through I2P to the outbound proxy.</p> outbound proxy (squid.i2p). If you have your browser set to use the web
proxy, if you type http://google.com/ your request will be routed through I2P
to the outbound proxy.
</p>
<h3>How anonymous is I2P anyway?</h3> <h3>How anonymous is I2P anyway?</h3>
<p>I2P is working to support militant grade anonymity, <b>but we're not there yet</b>. You should not <p>
use I2P if you <i>need</i> your anonymity - there are likely bugs and perhaps other issues, and it I2P is working to support militant grade anonymity, <b>but we're not there
has not gone through sufficient peer review. However, we're confident that we'll get to the point yet</b>. You should not use I2P if you <i>need</i> your anonymity - there are
that we can provide anonymity strong enough even for militantly subversive political action (so it likely bugs and perhaps other issues, and it has not gone through sufficient
should be fine for you to chat online with your friends)</p> peer review. However, we're confident that we'll get to the point that we can
provide anonymity strong enough even for militantly subversive political
<p>An important point to note is that I2P does <b>not</b> provide anonymity or security of content action (so it should be fine for you to chat online with your friends)
after it is transferred - you can still download and run a virus, or even submit your full name </p>
and bank account numbers on an eepsite. I2P only tries to provide communication security and anonymity - <p>
what you say or do is up to you.</p> An important point to note is that I2P does <b>not</b> provide anonymity or
security of content after it is transferred - you can still download and run a
virus, or even submit your full name and bank account numbers on an eepsite.
I2P only tries to provide communication security and anonymity - what you say
or do is up to you.
</p>
<h3>How does I2P protect itself from denial of service attacks?</h3> <h3>How does I2P protect itself from denial of service attacks?</h3>
<p> <p>
For this too, there are several answers. Short summary is "the best it can". For this too, there are several answers. Short summary is "the best it can".
Briefly, I2P attempts to defend against several forms of denial of service Briefly, I2P attempts to defend against several forms of denial of service
@@ -57,27 +76,36 @@ what you say or do is up to you.</p>
<p> <p>
To prevent individual users from consuming excessive resources (registering To prevent individual users from consuming excessive resources (registering
too many tunnels, sending too many messages, looking up too many entries in too many tunnels, sending too many messages, looking up too many entries in
the network database, and creating too many router and destination identities), the network database, and creating too many router and destination
various messages and identities have a certificate attached to them. Currently identities), various messages and identities have a certificate attached to
these certificates are blank, but down the line they will be filled with them. Currently these certificates are blank, but down the line they will be
<a href="http://wiki.invisiblenet.net/iip-wiki?HashCash">IIP Wiki: HashCash</a> - a computationally expensive collision based on the contents of the filled with
message or identity. They can also be filled with other certificates as deemed <a href="http://wiki.invisiblenet.net/iip-wiki?HashCash">IIP Wiki: HashCash</a>
necessary (e.g. a blinded certificate from an anonymous certificate authority, - a computationally expensive collision based on the contents of the
a receipt for real currency payments, etc). It is also believed that through this message or identity. They can also be filled with other certificates as
certificate attachment system I2P will be able to overcome the <a href="http://citeseer.nj.nec.com/douceur02sybil.html">sybil attack</a>.<br> deemed necessary (e.g. a blinded certificate from an anonymous certificate
authority, a receipt for real currency payments, etc). It is also believed
that through this certificate attachment system I2P will be able to overcome
the <a href="http://citeseer.nj.nec.com/douceur02sybil.html">sybil attack</a>.
</p> </p>
<p> <p>
Other denial of service attacks include creating a few thousand high quality Other denial of service attacks include creating a few thousand high quality
I2P routers, running them for a week, and then taking them all offline. This I2P routers, running them for a week, and then taking them all offline. This
indeed may force the creation of islands within the network, but the underlying indeed may force the creation of islands within the network, but the
<a href="/network_database?PHPSESSID=a8b251952f5a8f0b893e37f48a2c6f64">Network Database</a> is built off of a modified <a href="http://citeseer.nj.nec.com/529075.html">Kademlia</a>, underlying <a href="how_networkdatabase">Network Database</a> is built off of
which should allow the network to recover with minimal overhead (though, of course, a modified <a href="http://citeseer.nj.nec.com/529075.html">Kademlia</a>,
if a router has literally no other peers left after the bad ones leave, that router will which should allow the network to recover with minimal overhead (though, of
need to 'reseed' - fetch a reference to another router through some other mechanism). course, if a router has literally no other peers left after the bad ones
leave, that router will need to 'reseed' - fetch a reference to another router
through some other mechanism).
</p> </p>
<!--
<hr /> <hr />
<h3>I have a question!</h3> <h3>I have a question!</h3>
<p>
<p>Great! Please leave a comment and we'll include it here (with the answer, hopefully)</p> Great! Please leave a comment and we'll include it here (with the answer,
hopefully)
</p>
- People can't comment articles anymore. :) (ugha)
-->