Anonymity - When should I use i2p instead of Tor ? #168

Open
opened 2024-11-21 08:49:30 +01:00 by nihilist · 0 comments
Owner

Warning, the plan with this one is to break this trend of "recommending I2P without justifying why it should be used instead of Tor" i want a clear comparaison with the 2, and a clear conclusion on when i2P is to be used instad of Tor, and vice versa.

As far as i'm concerned, Tor can do preety much everything that I2P can, while having a much larger network, and many more users. therefore we need to list the usecases where I2P should be used instead of Tor.

to be explained:

  • what is I2P ?

  • what are the differences between I2P and Tor: (routing protocol differences, size of the network, amount of users, amount of studies, clearnet possibility?, noob friendly?)

  • complex part: provide a history timeline of the vulnerabilities that Tor faced in the past (which led to deanonymization attacks), and how quickly each of those were patched.

  • Do the same with i2p, history of vulnerabilities and how quickly each of those were patched.

  • Conclude on which one is better for anonymity (the size of network, amount of users (as anonymity is about being one amongst a big group of people), the protocol strength and weaknesses)

  • Conclude on what actual usecases i2p should be used instead of Tor. Torrenting ? Better bandwidth ?

Warning, the plan with this one is to break this trend of "recommending I2P without justifying why it should be used instead of Tor" i want a clear comparaison with the 2, and a clear conclusion on when i2P is to be used instad of Tor, and vice versa. As far as i'm concerned, Tor can do preety much everything that I2P can, while having a much larger network, and many more users. therefore we need to list the usecases where I2P should be used instead of Tor. to be explained: - what is I2P ? - what are the differences between I2P and Tor: (routing protocol differences, size of the network, amount of users, amount of studies, clearnet possibility?, noob friendly?) - complex part: provide a history timeline of the vulnerabilities that Tor faced in the past (which led to deanonymization attacks), and how quickly each of those were patched. - Do the same with i2p, history of vulnerabilities and how quickly each of those were patched. - Conclude on which one is better for anonymity (the size of network, amount of users (as anonymity is about being one amongst a big group of people), the protocol strength and weaknesses) - Conclude on what actual usecases i2p should be used instead of Tor. Torrenting ? Better bandwidth ?
nihilist added this to the OPSEC Tutorials (paid contributions) project 2024-11-21 08:49:30 +01:00
nihilist added the
Complex
label 2024-11-21 08:49:53 +01:00
Sign in to join this conversation.
No Milestone
No Assignees
1 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: nihilist/blog-contributions#168
No description provided.