more removal of old stuff

This commit is contained in:
zzz
2025-01-14 12:23:24 -05:00
parent 716fa14e0a
commit bec3db775c

View File

@ -781,6 +781,8 @@ two in particular are pulled out here - Tor and Freenet.
<p>{% trans comparisons=site_url('comparison') -%}
See also the <a href="{{ comparisons }}">Network Comparisons Page</a>.
Note that these descriptions were written by jrandom in 2003 and
may not currently be accurate.
{%- endtrans %}</p>
<h2 id="similar.tor">Tor</h2>
@ -831,11 +833,6 @@ in a tunnel is important, as an adversary would otherwise be able to mount
a series of powerful predecessor, intersection, and traffic confirmation attacks.
{%- endtrans %}</p>
<p>{% trans -%}
Tor's support for a second tier of "onion proxies" does offer a non-trivial
degree of anonymity while requiring a low cost of entry, while I2P will not
offer this topology until <a href="#future.restricted">2.0</a>.
{%- endtrans %}</p>
<p>{% trans -%}
On the whole, Tor and I2P complement each other in their focus - Tor works
@ -881,20 +878,6 @@ Freenet team will pursue efforts in that direction, if not simply reusing
(or helping to improve, as necessary) existing mixnets like I2P or Tor.
{%- endtrans %}</p>
<p>{% trans -%}
It is worth mentioning that there has recently been discussion and work
by the Freenet developers on a "globally scalable darknet" using restricted
routes between peers of various trust. While insufficient information has
been made publicly available regarding how such a system would operate for
a full review, from what has been said the anonymity and scalability claims
seem highly dubious. In particular, the appropriateness for use in hostile
regimes against state level adversaries has been tremendously overstated,
and any analysis on the implications of resource scarcity upon the scalability
of the network has seemingly been avoided. Further questions regarding susceptibility
to traffic analysis, trust and other topics do exist, but a more in-depth
review of this "globally scalable darknet" will have to wait until the Freenet
team makes more information available.
{%- endtrans %}</p>
<h1 id="app">Appendix A: Application layer</h1>
<p>{% trans -%}
@ -1076,9 +1059,7 @@ to delivery through the mail.i2p outproxies, which are separate from the mail.i2
SMTP and POP3 servers - both the outproxies and inproxies communicate with
the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those
non-anonymous locations does not give access to the mail accounts or activity
patterns of the user. At the moment the developers work on a decentralized
mailsystem, called "v2mail". More information can be found on the I2P Site
<a href="http://{{ postman }}/">{{ postman }}</a>.
patterns of the user.
{%- endtrans %}</p>