-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > > We have had NAT traversal for a while now. It was described in > > the SSU specs [1] that I sent to toad for comment sometime in > > the early summer, and deployed in 0.6.0.6 [2].
> Well, I was basing this on: http://www.i2p.net/faq#ports, which says: [snip] > Is that information out of date? Yes - as you can see, it also doesn't mention the UDP transport. I haven't had time to work on the website, it'll be revamped later this month though, I hope. > I am sure we could all inform ourselves better about many things > given sufficient time. True indeed, but there aren't that many things going on in the anonymity field - perhaps a dozen public projects past the "vague idea" stage? You've also shown that you don't follow the DHT field either, as we discussed some pretty substantial theoretical research last time, none of which you were familiar with. What efforts in the anonymity field do you follow? > You are right, we didn't invent I2P here, because I2P doesn't meet > our requirements, nor does anything that relies on a DHT for its > operation. I thought relying upon a DHT was something redundant, in your eyes, as "Freenet is like a DHT", not something that failed to meet your requirements. Or are your requirements novelty? > >I don't care about technology, I care about results. What will > >help real live people. > > Just not if they live in China, Saudi Arabia, Iran, or maybe even > the UK several years from now... Of course I care about them, but I'm only one person. I've written 95% of the I2P SDK and router, and probably a third of the LOC in the client apps, and I'm overwhelmed just doing what I do. I can't do everything for everybody all at once. If Freenet were to run on top of I2P, the reuse made possible would free up substantial resources (aka hours) across both teams, allowing further improvement of the capacity to help those in hostile regimes. As I can't do it myself, I don't promote it for such a use. > you have provided no evidence that your approach is better suited > to meeting the requirements we share. What better evidence can I offer beyond working code? You haven't even bothered to see what you're talking about. This is why I dismiss any notions that you've "seriously considered" I2P, as you've never actually looked into it. Have you actually run any of the I2P releases put out in the last 2 years? This, in turn, suggests to me that neither have you "seriously considered" running over Tor. Last I heard, the complaints being stated about Tor were that "its centralized", without any regard to the work that the Tor folks are making on decentralization. "Serious consideration" means doing some work. We've discussed in this thread how I2P can offer the same level of operation that Freenet/dark can, unless you're either disconnected from the Internet or any notion of a free press is gone (as without the ability to communicate anonymously, there is no free press). The Freenet/0.7 algorithm is neat, but it also isn't too different from the old CPA (only now there's a theoretical basis for it, instead of a purely heuristic basis). Not to diminish Oskar's and your work on that research, from a practical point of view, it doesn't change Freenet/light too much (and Freenet/dark is just a different way of distributing references). =jr -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFDT9lMWYfZ3rPnHH0RAgaaAJ9Ux0IpPf6xFEuShQGDzOBsVv6X2QCfcC22 8JnB2JCCvHb3lmPD4D/64Ro= =Sor5 -----END PGP SIGNATURE-----
