pull down to refresh
0 sats \ 1 reply \ @kristapsk 11 Dec 2022 \ on: TOR network DDOS attacks lead to I2P solution for Bitcoin Privacy apps bitcoin
I2P is also supported in Bitcoin Core since v22 (September 2021).
There is discussion about possibility to add it to JoinMarket too. https://github.com/JoinMarket-Org/joinmarket-clientserver/issues/1370
I2P and Tor are both anonymous networks that are designed to protect the privacy of users by routing internet traffic through a network of servers. However, there are some differences between the two networks that may affect their level of anonymity.
I2P, or the Invisible Internet Project, is an anonymous network that is designed to provide secure and anonymous communication for a wide range of applications. It uses a technique called garlic routing, which encrypts data and routes it through multiple servers in the network, making it difficult for outsiders to track the origin of the data.
Tor, or The Onion Router, is another anonymous network that is designed to protect the privacy of users by routing internet traffic through a network of servers. It uses a technique called onion routing, which encrypts data and routes it through multiple layers of servers, making it difficult for outsiders to track the origin of the data.
In general, both I2P and Tor provide a high level of anonymity for users, and both networks are effective at protecting the privacy of users. However, there are some differences between the two networks that may affect their level of anonymity. For example, I2P is a smaller network than Tor, which means that it may be less resistant to attacks or other forms of surveillance. Additionally, Tor has been extensively tested and studied, and it is widely considered to be one of the most secure anonymous networks available.
Overall, whether I2P or Tor is more anonymous will depend on a variety of factors, including the specific threat model and the level of security and anonymity that is required.
reply