On Sun, Dec 9, 2012 at 5:47 AM,  <[email protected]> wrote:
> I'd be interested if gnunet or i2p have seem similar usage by
> botnets.

I was going to write that for I2P it is highly unlikely due to
autonomous daemon configuration complexity, a dependency on Java, and
unreliability wrt. network configuration changes, but here is a botnet
advertisement that mentions I2P support:
http://uscyberlabs.com/blog/2012/09/24/dark-heart-botnet-tor-c2-bullet-proof-server-collector/

--
Maxim Kammerer
Liberté Linux: http://dee.su/liberte
_______________________________________________
tor-talk mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to