more removal of old stuff
This commit is contained in:
@ -781,6 +781,8 @@ two in particular are pulled out here - Tor and Freenet.
|
||||
|
||||
<p>{% trans comparisons=site_url('comparison') -%}
|
||||
See also the <a href="{{ comparisons }}">Network Comparisons Page</a>.
|
||||
Note that these descriptions were written by jrandom in 2003 and
|
||||
may not currently be accurate.
|
||||
{%- endtrans %}</p>
|
||||
|
||||
<h2 id="similar.tor">Tor</h2>
|
||||
@ -831,11 +833,6 @@ in a tunnel is important, as an adversary would otherwise be able to mount
|
||||
a series of powerful predecessor, intersection, and traffic confirmation attacks.
|
||||
{%- endtrans %}</p>
|
||||
|
||||
<p>{% trans -%}
|
||||
Tor's support for a second tier of "onion proxies" does offer a non-trivial
|
||||
degree of anonymity while requiring a low cost of entry, while I2P will not
|
||||
offer this topology until <a href="#future.restricted">2.0</a>.
|
||||
{%- endtrans %}</p>
|
||||
|
||||
<p>{% trans -%}
|
||||
On the whole, Tor and I2P complement each other in their focus - Tor works
|
||||
@ -881,20 +878,6 @@ Freenet team will pursue efforts in that direction, if not simply reusing
|
||||
(or helping to improve, as necessary) existing mixnets like I2P or Tor.
|
||||
{%- endtrans %}</p>
|
||||
|
||||
<p>{% trans -%}
|
||||
It is worth mentioning that there has recently been discussion and work
|
||||
by the Freenet developers on a "globally scalable darknet" using restricted
|
||||
routes between peers of various trust. While insufficient information has
|
||||
been made publicly available regarding how such a system would operate for
|
||||
a full review, from what has been said the anonymity and scalability claims
|
||||
seem highly dubious. In particular, the appropriateness for use in hostile
|
||||
regimes against state level adversaries has been tremendously overstated,
|
||||
and any analysis on the implications of resource scarcity upon the scalability
|
||||
of the network has seemingly been avoided. Further questions regarding susceptibility
|
||||
to traffic analysis, trust and other topics do exist, but a more in-depth
|
||||
review of this "globally scalable darknet" will have to wait until the Freenet
|
||||
team makes more information available.
|
||||
{%- endtrans %}</p>
|
||||
|
||||
<h1 id="app">Appendix A: Application layer</h1>
|
||||
<p>{% trans -%}
|
||||
@ -1076,9 +1059,7 @@ to delivery through the mail.i2p outproxies, which are separate from the mail.i2
|
||||
SMTP and POP3 servers - both the outproxies and inproxies communicate with
|
||||
the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those
|
||||
non-anonymous locations does not give access to the mail accounts or activity
|
||||
patterns of the user. At the moment the developers work on a decentralized
|
||||
mailsystem, called "v2mail". More information can be found on the I2P Site
|
||||
<a href="http://{{ postman }}/">{{ postman }}</a>.
|
||||
patterns of the user.
|
||||
{%- endtrans %}</p>
|
||||
|
||||
|
||||
|
Reference in New Issue
Block a user