qBittorrent 4.6 launches with I2P support - gHacks Tech NewsLee Duna@lemmy.nz to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com – 497 points – 1 years agoghacks.net64Post a CommentPreviewYou are viewing a single commentView all commentsShow the parent commentHow are nodes chosen by the client? What stops governments/LEO/copyright dragons from spinning up thousands of the fastest/most accessable i2p nodes so that clients connect to them first, then these hosts log the traffic paths to identify origin/destination?https://geti2p.net/en/docs/how/threat-model#sybil Good write-up from the I2P team on this topic. Page includes other attack vectors as well.1 more...
How are nodes chosen by the client? What stops governments/LEO/copyright dragons from spinning up thousands of the fastest/most accessable i2p nodes so that clients connect to them first, then these hosts log the traffic paths to identify origin/destination?https://geti2p.net/en/docs/how/threat-model#sybil Good write-up from the I2P team on this topic. Page includes other attack vectors as well.1 more...
https://geti2p.net/en/docs/how/threat-model#sybil Good write-up from the I2P team on this topic. Page includes other attack vectors as well.
How are nodes chosen by the client?
What stops governments/LEO/copyright dragons from spinning up thousands of the fastest/most accessable i2p nodes so that clients connect to them first, then these hosts log the traffic paths to identify origin/destination?
https://geti2p.net/en/docs/how/threat-model#sybil
Good write-up from the I2P team on this topic. Page includes other attack vectors as well.