Shoalsteed / I2P-Network-Security

I2P Network Security for Participants and Admins
0 stars 1 forks source link

I2P Network Security for Participants and Admins

Index

  1. History
  2. I2P Java Overview
  3. i2pD Overview
  4. Research Summary of vulnerabilities
  5. Network Threat Model
  6. Personal Threat Model
  7. OPSEC
  8. OS and environment hardening
  9. I2P configuration defaults
  10. I2P Configurations for advanced threat modelling
  11. Best practices for admins and service operators