*nods* Yeah, I don't really like hyperboria, And cjdns. I looked for a very 
long time after I found netsukuku for something better because it was in such 
early stages. And I found CJDNS and many others, And they honestly don't even 
compare.




________________________________
 From: Ricardo Lanziano <[email protected]>
To: Netsukuku discussion list <[email protected]> 
Sent: Saturday, May 25, 2013 8:01:31 AM
Subject: Re: [Netsukuku] Some first node
 


On Sat, May 25, 2013 at 9:24 AM, Yussi <[email protected]> wrote:

>
>
>> There is a C++ port of I2P at http://projects.i2p but it is not fully
>> functional yet.
>>
>> If you want, we can try to set up some tunnels and hook up some services,
>> I have a machine I can spare in I2P.
>>
>> I rather use I2P than TOR (CJDNS is out of the question).
>LOL, is this a matter of pride? There are a lot of good people on cjdns,
>and it's not a bad idea. I don't think we should position ourselves
>against it, and when possible we should try and work together.
>

No, of course not. My main problem with CJDNS is that is *not*

a secure darknet because it is not anonymous, in contrast with I2P.


I2P is an anonymous mixnet with networking layer *on top*. It

vastly differs from CJDNS.


In fact, you can't compare CJDNS to I2P. I2P builts unidirectional
tunnels of n lenght that lasts 10 mins or so, and you need to build
a tunnel for both receiving and sending data, that are always changing.

You get a totally different return path for the same connection, ie: IRC,
web, XMPP... I2P provides *anonymity*.


CJDNS offers you a static path for your packets, since tunnels crosses
for the same machines.


The main idea of Netsukuku is that the network grows itselfs, free
of censorship, control, and single-point of failure. So, yes, I think

it's a bad idea if we want Netsukuku to grow in features and in
research.


I am not against CJDNS nor the people that runs in Hyperboria (an
invite-only network iirc? ;) ) but in terms of features, related work

and anonymity and censorship resistant mindset, I rather look at

I2P.


For example, taking real content authentication for the network:
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.73.2699

-- 
Ricardo Lanziano
To iterate is human, to recurse, divine. 
_______________________________________________
Netsukuku mailing list
[email protected]
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/netsukuku
_______________________________________________
Netsukuku mailing list
[email protected]
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/netsukuku

Reply via email to