Lee Duna@lemmy.nz to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 1 year agoqBittorrent 4.6 launches with I2P support - gHacks Tech Newswww.ghacks.netexternal-linkmessage-square64fedilinkarrow-up1513arrow-down18cross-posted to: tecnologia
arrow-up1505arrow-down1external-linkqBittorrent 4.6 launches with I2P support - gHacks Tech Newswww.ghacks.netLee Duna@lemmy.nz to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 1 year agomessage-square64fedilinkcross-posted to: tecnologia
minus-squareAgent641@lemmy.worldlinkfedilinkEnglisharrow-up3·1 year agoHow are nodes chosen by the client? What stops governments/LEO/copyright dragons from spinning up thousands of the fastest/most accessable i2p nodes so that clients connect to them first, then these hosts log the traffic paths to identify origin/destination?
minus-squareAndrewZen@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up4·edit-21 year agodeleted by creator
minus-squareStrict3443@lemmy.mllinkfedilinkEnglisharrow-up3·1 year agohttps://geti2p.net/en/docs/how/threat-model#sybil Good write-up from the I2P team on this topic. Page includes other attack vectors as well.
How are nodes chosen by the client?
What stops governments/LEO/copyright dragons from spinning up thousands of the fastest/most accessable i2p nodes so that clients connect to them first, then these hosts log the traffic paths to identify origin/destination?
deleted by creator
https://geti2p.net/en/docs/how/threat-model#sybil
Good write-up from the I2P team on this topic. Page includes other attack vectors as well.