this post was submitted on 20 Sep 2024
186 points (96.5% liked)

Privacy

31957 readers
502 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 2 points 1 month ago (1 children)

Yes it has better defenses against timing attacks. Just alone the fact that multiple packets are bundled together makes it harder to identify the route a single package used.

Also, it seems that I2P is more vulnerable against deanonymization when leaving the hidden network, i think the official I2P faq has some info about that, but have not read up upon it myself.

[–] [email protected] 1 points 1 month ago* (last edited 1 month ago)

Also, it seems that I2P is more vulnerable against deanonymization when leaving the hidden network, i think the official I2P faq has some info about that, but have not read up upon it myself.

on a quick look I did not find such a mention, but in any case in addition to that, I2P users often don't have such a fortified browser as Tor users do, so that's also something to count with.

and maybe it's not a good idea either to just reconfigure a Tor browser profile for I2P