Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How are they going to find someone in I2P network?


First off, not everyone is using I2P to hide their torrenting. If they were, I'm pretty sure we'd have to worry about a well-funded actor (like the RIAA of old) flooding the network with new nodes to be able to expose users.

It's instructive to read the I2P threat model, https://geti2p.net/en/docs/how/threat-model, as it details a number of potential attacks within reach of a large corporate or state-level adversary




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: