I2P and the Dark Web
-
Upload
john-liu-cfa -
Category
Internet
-
view
363 -
download
0
Transcript of I2P and the Dark Web
FLAWS OF TOR
ExitNodeTarge.ng
EntryPointSurveillance
So7ware/HardwareFingerprin.ng
TimingAnalysis
Des.na.onFingerprin.ng
CentralServerRepository
MITM
STORY OF ELDO K.• HARVARD STUDENT • DIDN’T WANT TO TAKE FINAL EXAM • EMAILED BOMB THREAT • USED TOR TO DISGUISE HIMSELF
WHAT HAPPENED?• ELDO USED UNIV NETWORK TO ACCESS TOR • HE WAS IDENTIFIED AND ARRESTED IN HOURS • ELDO SENTENCED TO COMMUNITY SERVICE
WHAT IS I2P?• ORIGINATED IN 2003 AS
INVISIBLENET• DECENTRALIZED NETWORK
LAYER• END-TO-END ENCRYPTION• NO OUTPROXY TO CLEARNET
COMPARISONTor I2PCell Message
Client Router
Circuit Tunnel
Directory NetDB
Hidden Service Eepsite
Onion Garlic
Less Secure More Secure
I2P LIMITATIONS
• NO ACCESS TO CLEARNET • SMALL USER BASE • STILL VULNERABLE TO ATTACK
(BUT LESS SO THAN TOR)