Yet another reason to call him #$%& Re: yet another reason...

Steve Kinney admin at pilobilus.net
Sat Oct 20 12:12:22 PDT 2018



On 10/19/18 5:58 PM, Shawn K. Quinn wrote:

> Of course, #$%& has no clue how BitTorrent works. It's nearly pointless
> to route just the tracker callbacks through Tor, and routing the actual
> data over Tor would overload the network. I don't blame them for making
> it easy to block BitTorrent traffic; there are other filesharing tools
> which are a better fit if anonymity is a priority (Freenet, GNUNet, etc).

TOR schmore.  I would describe i2p as an anonymizing torrent
distribution network, with some other comms (in-network websites,
e-mail, etc.) piggybacking on the infrastructure that file sharing
traffic keeps up and running.

https://geti2p.net/en/

The Garlic Routing protocol used by i2p looks at least as secure as
Onion Routing - and IMO more so, because of both the protocol's
architecture, and the dynamics of real world traffic flow where a small
number of "dangerous" packets mix into a huge number of movies, TV
shows, record albums etc. in transit.  Extra paranoid users can
configure i2p to use longer chains, further complicating things for
adversaries.  By default all i2p nodes relay third party traffic, and at
present no (advertised) gateways connect i2p to the 'regular' Internet.

The high volume of torrent traffic over i2p, and the loooong duration of
typical downloads (25kbps counts as 'decent speed' in there), greatly
complicate matters for anyone doing traffic analysis, compared to the
hit-and-run pattern of TOR usage that typically lights up an entry and
exit router for just a few minutes per user session, during which easily
fingerprinted clusters of packets, all of them "of interest" to
potential adversaries, flow thick and fast.

The most reliable anonymity against State level adversaries uses TOR for
hit-and-run network access via a high gain antenna and open router, or
any dodge that physically decouples the user from the physical router's
IP address.  i2p can't do that very well, because it takes 20 minutes or
more to integrate into the network and start moving packets.  So
double-nought spies and their ilk can get that much mileage out of TOR.

So far I have not come up with a way to prevent what I call a Hydra
attack against /any/ distributed anonymizing overlay network:  An
adversary who owns and operates a majority of the relay nodes via
geographically dispersed proxies run from a single cloud server
literally "can't be beat" except by physically concealing one's identity
from the physical Internet router used.

Users who expect mere software to defeat network surveillance by top
tier actors have started out with false assumptions and end up taking
far greater risks than they would consider acceptable if they knew about
them.  The reluctance of intelligence services to reveal their
capabilities by acting on what they know too often provides the best
protection most users can get...

:o/












-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: OpenPGP digital signature
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20181020/9a3daa18/attachment.sig>


More information about the cypherpunks mailing list