-
No
chevron_right
i2p Anonymity Network Notes ep. 1
𝖈𝖍𝖚𝖓𝖐 · pubsub.toofast.vip / notes · Sunday, 26 November - 10:51 edit · 1 minute
https://geti2p.net/en/docs/how/intro
https://geti2p.net/en/docs/how/threat-model
https://geti2p.net/en/docs/protocol
https://geti2p.net/en/docs/transport
"Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the originator of some communication and not the recipient, or the other way around. I2P is designed to allow peers using I2P to communicate with each other anonymously — both sender and recipient are unidentifiable to each other as well as to third parties." from https://geti2p.net/en/docs/how/intro
"The network itself is message oriented - it is essentially a secure and anonymous IP layer, where messages are addressed to cryptographic keys (Destinations) and can be significantly larger than IP packets."
...
So my next questions, in parallel to these links, is for starters what kind of encryption happens that makes tranmissions on i2p network 'anonymous' ? Then I'm curious, how does using a cryptographic hash for a destination or a host (in place of where you'd think an IP address goes, in terms of routing traffic) or an origin host provide anonymity? Or is that it's intention? I'm aware of a couple of fun i2p resources, that are way beyond my current (lack of) comprehension of the i2p network. I will share in comments.