you can replace i2p for services with tor hidden services quite easily,
and as far as content retrieval, which part of the process is your focus
when ascribing insecurity? storage or transit? TOR sorts out transit,
and the server operator using a decently strongly encrypted storage
would keep the
unless i'm mistaken, for the average adsl/cable user, this means some
meaningless number like 10.0.0.2 or 192.168.0.4
Andrew Del Vecchio wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Very true. Add to this the use of secure apps. This means no Skype,
which codes your local IP into
For content retrieval: Freenet/Gnunet.
For anonymous services: I2P(possibly)
For anonymous Internet: Tor
For anonymous email: Onion Routers
Each piece of software fills a niche in this hierarchy. Tor is the most
important as it lets people use existing applications anonymously. Sure,
Tor will
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Very true. Add to this the use of secure apps. This means no Skype,
which codes your local IP into headers, etc.
~Andrew
Frivolous lawsuits. Unlawful government seizures. It's a scary world
out there!
Protect your privacy, keep what you earn, and
4 matches
Mail list logo