
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 02/13/2014 11:43 AM, Zack Weinberg wrote:
(Four hops is what I2P uses, with two chosen entirely by the client and two entirely by the server; but there appears to be nothing to guarantee that a malicious peer can't connect directly to its counterparty's two-hop chain, sacrificing some of its own anonymity but getting closerfor a while now to the counterparty. I did just argue that that shouldn't matter, though...)
Just FTR, since 0.9.7.1 I2P defaults to 3 hops for "client" tunnels (so default of 6 hops end-to-end, and 12 hops round-trip). And yes, there is nothing stopping a malicious peer building zero-hop tunnels (acting as its own Outbound Endpoint/Inbound Gateway), just as honest clients or servers can choose to use zero-hop tunnels (e.g. a website or IRC network that requires no anonymity of its own, but wants its users to benefit). str4d
zw
_______________________________________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (GNU/Linux) iQEcBAEBCgAGBQJS/f/RAAoJENXeOJaUpGWyUB8H/RI45Bc7TXc7y2SN0Tj1Sabz Wwjqb4tb4fhcFV7C6biJEFg6sKR1GPnNAa6AsadoMREJ/KD64t9eoii1g38x/UdN GxwHLk/h7zJCTRxMR0W89S7nIGimzp/I12urLXwYvvIoKjbytX1a9e3TkZpBmOvS D1JvAhVeoMa2dUfjT4jZH83kGQ3PlWvYPOvyv5CiSgoE6KHXWn2pYfNiOQF8mzWU oDU0TaNMsATjX/y1bwPAdf6w+DoKOw2xmpVyutY5+CYRC9BrvqAyV5WWwVvOTZHz gTIYVToLGN79PBsMDT0nJoxvm58a734qR9XANo5fDegkJIWKY+Ac/cBwadq25A0= =1wAz -----END PGP SIGNATURE-----