Shoalsteed / I2P-Network-Security

I2P Network Security for Participants and Admins
0 stars 1 forks source link

Feedback #1

Open diva-exchange opened 2 years ago

diva-exchange commented 2 years ago

I2P Network Security for Participants and Admins

[...] I2Pd Overview

Suitable for Beginners and Advanced Users: for those which prefer to have I2Pd containerized (running programs isolated within their operating system, like Windows, Linux or MacOS), here are the installation instructions for such a setup: https://www.diva.exchange/en/privacy/introduction-to-i2p-your-own-internet-secure-private-and-free/ or also on github https://github.com/diva-exchange/i2p

Containerization is reducing operational risks on a system significantly.

Research Summary of vulnerabilities 2022: research on "How to De-Anonymize I2P Network Participants" has been done by the "University of Applied Science and Art Lucerne, Switzerland". The results in a nutshell: theoretical findings have shown that a "tunnel takeover" is possible and hence every target within the I2P network could be deanonymized. The costs of such an attack are high (but not as high that it would require a state-level actor to perform such an attack) with the default configuration settings of I2P. By using variable tunnel lenghts (variable tunnel length of 3 - 5) the costs of the attack increase significantly. Source (complete work in German): https://github.com/diva-exchange/academia/blob/main/research_studies/2022/De-Anonymisierung%20von%20Teilnehmern%20des%20I2P%20Netzwerkes/HSLU___BAA___Deanonymisierung_I2P.pdf Video, Presentation of Research results (English): https://odysee.com/@diva.exchange:d/monerokon2022:0

[...]

Shoalsteed commented 2 years ago

Thank you so much!