Roll Over Tor, Nate Drake explores the strengths of the shadowy I2P network.
TI2P (The Invisible Internet Project) is a form of ‘darknet’ allowing users to visit web pages, chat, blog and even BitTorrent securely. A more detailed technical rundown is forthcoming but for now it’s enough to know that this anonymous peer to peer network provides the strongest protection against attempts to unmask your location and/or identity. This is mainly because it has been built from the bottom up with privacy in mind, but it also is largely unknown in privacy circles when compared to more popular alternatives such as Freenet or Tor. We are sure you can appreciate the irony.
Readers interested in their own security may well already be aware of Tor and its trusty companion the Tor browser bundle. (See www.torproject.org if not). Tor is also designed to anonymise your connection on the internet. The method used to achieve anonymity through I2P is similar to Tor’s. In fact, one of the safest ways to access I2P’s own ‘eepsites’ is to use the Tor Browser Bundle or the custom I2P browser in the TAILS Operating System.
As such, is I2P trying to reinvent the wheel, given that we already have Tor? In order to answer this question, it’s essential to understand Tor’s weaknesses. Tor uses ‘onion routing’—a process for sending data anonymously over networks. Packets of data are encrypted and sent through multiple nodes run by volunteers throughout the world.
Each Tor relay only knows the previous location of an encrypted packet as well as the next node to which it is being sent. It’s like peeling an onion; individual layers only touch those immediately in front and behind them. All the others remain totally separate to the others.
この記事は Linux Format の March 2017 版に掲載されています。
7 日間の Magzter GOLD 無料トライアルを開始して、何千もの厳選されたプレミアム ストーリー、9,000 以上の雑誌や新聞にアクセスしてください。
すでに購読者です ? サインイン
この記事は Linux Format の March 2017 版に掲載されています。
7 日間の Magzter GOLD 無料トライアルを開始して、何千もの厳選されたプレミアム ストーリー、9,000 以上の雑誌や新聞にアクセスしてください。
すでに購読者です? サインイン
Create your first WebSocket service
Mihalis Tsoukalos explains how to use the Go programming language to work with the WebSocket protocol.
Fantastic Mr Firefox
Nick Peers takes a trip down memory lane to reveal the story behind the rise - and slight fall - of Mozilla's popular web browser.
Set up your terminal and email like it's 1983
Jump in the hot terminal time machine with Mats Tage Axelsson who emails from the command line using the latest technology.
Universal layer text effects with GIMP
Posters use them, films and presentations are hard to imagine without them: text effects. Attract attention with Karsten Günther and GIMP.
Jump to a federated social network
Nick Peers reveals how you can get up and running with this free, decentralised and non-profit alternative to Twitter.
Free our SOFTWARE!
Taking anything for granted is dangerous, so Jonni Bidwell and Mike Saunders revisit how the free software movement got started to help free us from proprietary tyranny!
Master RPI.GPIO
Les Pounder goes back to the early days of the Raspberry Pi - and his career with this classic library! -
Waveshare Zero to Pi3
Transform your Pi Zero into a Pi 3, they promised Les Pounder, but it's more like adding on go-faster stripes.
The Best OPEN SOURCE Software Ever!
In an attempt to trigger controversy, Michael Reed and Neil Mohr unequivocally state these are the greatest free software apps ever. Probably. We’re just trying to be helpful.
Linux-Mandrake 7
Simplicity and a wide range of applications make this a great distribution for all Linux users.