Hacker News new | past | comments | ask | show | jobs | submit login

AFAIK garlic routing is still harder to crack than Tor: https://geti2p.net/en/comparison/tor. The main advantage of Tor is the number of users.



The network security people I know stopped bothering publishing attacks on I2P's directory service--which was(/is) in fact subject to eclipse attacks--because I2P didn't seem to care to fix the issues. Here's a great paper.

https://sites.cs.ucsb.edu/~chris/research/doc/raid13_i2p.pdf


>The network security people I know stopped bothering publishing attacks on I2P's directory service

Maybe those you know stopped, but others didn't: https://geti2p.net/cs/papers/.


Great... are the issues getting fixed? The point I was making about I2P working so poorly that some people have given up trying to help--in addition to specifically noting that eclipse attacks do, in fact, affect the design of I2P--doesn't seem affected by "there exists people who still spend time demonstrating I2P doesn't work well" ;P.


I doubt the number of nodes is important when you can split a large group of them into a few subgroups and analyze them or alter how they interact with each other, then repeat subdivision; because again, them overlay networks are like smaller sandboxes inside the big one.


Don’t forget that you have to do all this within 10 minutes, because after that time the network configuration will be totally different.


Yes, overlay network's configuration will be somewhat different, but physically it will be the same. It's like you're rearranging apple bits in a pie to save them; the pie will be sliced and eaten anyways.


> the pie will be sliced and eaten anyways.

The difference is how long it takes and how much resources. There is no perfect security. Security is not a "yes/no" thing.


All correct. It's just important to remember who's the attacker:

  Alice -- ISP1 -- 1000 hops -- ISP2 -- Bob
Alice and Bob's identities are protected from each other, but not from the govt because ISPs collect metadata.


> because ISPs collect metadata

Which metadata? ISPs only know your next hop. Check out how garlic routing works.




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: