On Sun, Dec 9, 2012 at 5:47 AM, <[email protected]> wrote: > I'd be interested if gnunet or i2p have seem similar usage by > botnets.
I was going to write that for I2P it is highly unlikely due to autonomous daemon configuration complexity, a dependency on Java, and unreliability wrt. network configuration changes, but here is a botnet advertisement that mentions I2P support: http://uscyberlabs.com/blog/2012/09/24/dark-heart-botnet-tor-c2-bullet-proof-server-collector/ -- Maxim Kammerer Liberté Linux: http://dee.su/liberte _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
