Lee Duna to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish • 2 years agoqBittorrent 4.6 launches with I2P support - gHacks Tech Newswww.ghacks.netexternal-linkmessage-square65fedilinkarrow-up1510arrow-down18
arrow-up1502arrow-down1external-linkqBittorrent 4.6 launches with I2P support - gHacks Tech Newswww.ghacks.netLee Duna to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish • 2 years agomessage-square65fedilink
minus-square@Agent641@lemmy.worldlinkfedilinkEnglish3•2 years agoHow are nodes chosen by the client? What stops governments/LEO/copyright dragons from spinning up thousands of the fastest/most accessable i2p nodes so that clients connect to them first, then these hosts log the traffic paths to identify origin/destination?
minus-square@AndrewZen@lemmy.dbzer0.comlinkfedilinkEnglish4•2 years agoprobably nothing besides the cost. same thing happened to TOR.
minus-square@Strict3443@lemmy.mllinkfedilinkEnglish3•2 years agohttps://geti2p.net/en/docs/how/threat-model#sybil Good write-up from the I2P team on this topic. Page includes other attack vectors as well.
How are nodes chosen by the client?
What stops governments/LEO/copyright dragons from spinning up thousands of the fastest/most accessable i2p nodes so that clients connect to them first, then these hosts log the traffic paths to identify origin/destination?
probably nothing besides the cost. same thing happened to TOR.
https://geti2p.net/en/docs/how/threat-model#sybil
Good write-up from the I2P team on this topic. Page includes other attack vectors as well.