@Agent641@lemmy.world
link
fedilink
English
31Y

How are nodes chosen by the client?

What stops governments/LEO/copyright dragons from spinning up thousands of the fastest/most accessable i2p nodes so that clients connect to them first, then these hosts log the traffic paths to identify origin/destination?

@Strict3443@lemmy.ml
link
fedilink
English
31Y

https://geti2p.net/en/docs/how/threat-model#sybil

Good write-up from the I2P team on this topic. Page includes other attack vectors as well.

deleted by creator

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
!piracy@lemmy.dbzer0.com
Create a post
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don’t request invites, trade, sell, or self-promote

3. Don’t request or link to specific pirated titles, including DMs

4. Don’t submit low-quality posts, be entitled, or harass others


Loot, Pillage, & Plunder


💰 Please help cover server costs.

Ko-FiLiberapay


  • 1 user online
  • 219 users / day
  • 509 users / week
  • 927 users / month
  • 4.94K users / 6 months
  • 1 subscriber
  • 3.23K Posts
  • 79K Comments
  • Modlog