In general what grarpamp said is true, however we should remember that I2P (aka Invisible Internet Protocol) is designed to be "a real undernet" and thus it is focused mostly on hidden services and invisible hosting. It results in fact that there is much less outproxies than in TOR network. Using I2P to acces a "standard" Internet but in anonymous way is much less efficient than via TOR only because of that design issue, moreover I2P is just less popular than TOR and has less participating nodes, what additionally decreases it's efficiency. Zegar On 4 July 2014 23:04, grarpamp <[1]grarpamp@gmail.com> wrote: On 7/4/14, grarpamp <[2]grarpamp@gmail.com> wrote: > [3]https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be -the-nsa-to-break-tor-deanonymizing-users-on-a-budget I2P is a tool that likely presents the nearest analog to Tor's hidden services (.i2p) to the user. Usable in much the same way. Always good to be familiar with and have other options out there. And see that they receive community research and review efforts too. [4]http://geti2p.net/en/comparison/tor References 1. mailto:grarpamp@gmail.com 2. mailto:grarpamp@gmail.com 3. https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget 4. http://geti2p.net/en/comparison/tor