Anonymity - When should I use i2p instead of Tor ? #168
Labels
No Label
/!\ On Priority - High Quality Tutorial
? Impossible Currently ?
Complex
Doable
Simple
To be improved / simplified / finished / fixed
pushed to prod (1 month external review)
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: nihilist/blog-contributions#168
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Warning, the plan with this one is to break this trend of "recommending I2P without justifying why it should be used instead of Tor" i want a clear comparaison with the 2, and a clear conclusion on when i2P is to be used instad of Tor, and vice versa.
As far as i'm concerned, Tor can do preety much everything that I2P can, while having a much larger network, and many more users. therefore we need to list the usecases where I2P should be used instead of Tor.
to be explained:
what is I2P ?
what are the differences between I2P and Tor: (routing protocol differences, size of the network, amount of users, amount of studies, clearnet possibility?, noob friendly?)
complex part: provide a history timeline of the vulnerabilities that Tor faced in the past (which led to deanonymization attacks), and how quickly each of those were patched.
Do the same with i2p, history of vulnerabilities and how quickly each of those were patched.
Conclude on which one is better for anonymity (the size of network, amount of users (as anonymity is about being one amongst a big group of people), the protocol strength and weaknesses)
Conclude on what actual usecases i2p should be used instead of Tor. Torrenting ? Better bandwidth ?