Containerization is reducing operational risks on a system significantly.
Research Summary of vulnerabilities
2022: research on "How to De-Anonymize I2P Network Participants" has been done by the "University of Applied Science and Art Lucerne, Switzerland". The results in a nutshell: theoretical findings have shown that a "tunnel takeover" is possible and hence every target within the I2P network could be deanonymized. The costs of such an attack are high (but not as high that it would require a state-level actor to perform such an attack) with the default configuration settings of I2P. By using variable tunnel lenghts (variable tunnel length of 3 - 5) the costs of the attack increase significantly. Source (complete work in German): https://github.com/diva-exchange/academia/blob/main/research_studies/2022/De-Anonymisierung%20von%20Teilnehmern%20des%20I2P%20Netzwerkes/HSLU___BAA___Deanonymisierung_I2P.pdf
Video, Presentation of Research results (English): https://odysee.com/@diva.exchange:d/monerokon2022:0
I2P Network Security for Participants and Admins
[...] I2Pd Overview
Suitable for Beginners and Advanced Users: for those which prefer to have I2Pd containerized (running programs isolated within their operating system, like Windows, Linux or MacOS), here are the installation instructions for such a setup: https://www.diva.exchange/en/privacy/introduction-to-i2p-your-own-internet-secure-private-and-free/ or also on github https://github.com/diva-exchange/i2p
Containerization is reducing operational risks on a system significantly.
Research Summary of vulnerabilities 2022: research on "How to De-Anonymize I2P Network Participants" has been done by the "University of Applied Science and Art Lucerne, Switzerland". The results in a nutshell: theoretical findings have shown that a "tunnel takeover" is possible and hence every target within the I2P network could be deanonymized. The costs of such an attack are high (but not as high that it would require a state-level actor to perform such an attack) with the default configuration settings of I2P. By using variable tunnel lenghts (variable tunnel length of 3 - 5) the costs of the attack increase significantly. Source (complete work in German): https://github.com/diva-exchange/academia/blob/main/research_studies/2022/De-Anonymisierung%20von%20Teilnehmern%20des%20I2P%20Netzwerkes/HSLU___BAA___Deanonymisierung_I2P.pdf Video, Presentation of Research results (English): https://odysee.com/@diva.exchange:d/monerokon2022:0
[...]