[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] A Pluggable Transport based on i2p?



On 03/15/2017 10:36 AM, Jonathan Marquardt wrote:
> On Wed, Mar 15, 2017 at 06:20:53AM -0400, Lolint wrote:
>> Hi,
>>
>> Could it be possible to implement a pluggable transport using i2p? The way this could work
>> is that a server would function as a bridge node, and will also have the i2p router installed,
>> and the client will connect to this bridge via I2P Tunnels,
>>
>> <User><=><i2p network><=><bridge with i2p><=><Tor network><=><Clearnet or onion>
>>
>> What do you think?
>>
>> Thx
>>
>> --Jeff
>> -- 
>> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
>> To unsubscribe or change other settings go to
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 
> You want to hide the fact that you are using an anonymization network by using 
> an anonymization network. This idea seems pretty stupid to me.

Right. It would make sense, though, if you wanted to hide your identity
_from_ the anonymization network. Or more generally, as insurance.
You're OK if Tor gets pwned, or if I2P gets pwned. But you're still
pwned if network edges get pwned, so maybe not worth the latency hit.
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk