From bec3db775c34f20756fea0beb78490a252c3a5e9 Mon Sep 17 00:00:00 2001
From: zzz {% trans comparisons=site_url('comparison') -%}
See also the Network Comparisons Page.
+Note that these descriptions were written by jrandom in 2003 and
+may not currently be accurate.
{%- endtrans %}Tor
@@ -831,11 +833,6 @@ in a tunnel is important, as an adversary would otherwise be able to mount
a series of powerful predecessor, intersection, and traffic confirmation attacks.
{%- endtrans %}
{% trans -%} -Tor's support for a second tier of "onion proxies" does offer a non-trivial -degree of anonymity while requiring a low cost of entry, while I2P will not -offer this topology until 2.0. -{%- endtrans %}
{% trans -%} On the whole, Tor and I2P complement each other in their focus - Tor works @@ -881,20 +878,6 @@ Freenet team will pursue efforts in that direction, if not simply reusing (or helping to improve, as necessary) existing mixnets like I2P or Tor. {%- endtrans %}
-{% trans -%} -It is worth mentioning that there has recently been discussion and work -by the Freenet developers on a "globally scalable darknet" using restricted -routes between peers of various trust. While insufficient information has -been made publicly available regarding how such a system would operate for -a full review, from what has been said the anonymity and scalability claims -seem highly dubious. In particular, the appropriateness for use in hostile -regimes against state level adversaries has been tremendously overstated, -and any analysis on the implications of resource scarcity upon the scalability -of the network has seemingly been avoided. Further questions regarding susceptibility -to traffic analysis, trust and other topics do exist, but a more in-depth -review of this "globally scalable darknet" will have to wait until the Freenet -team makes more information available. -{%- endtrans %}
{% trans -%} @@ -1076,9 +1059,7 @@ to delivery through the mail.i2p outproxies, which are separate from the mail.i2 SMTP and POP3 servers - both the outproxies and inproxies communicate with the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those non-anonymous locations does not give access to the mail accounts or activity -patterns of the user. At the moment the developers work on a decentralized -mailsystem, called "v2mail". More information can be found on the I2P Site -{{ postman }}. +patterns of the user. {%- endtrans %}