Psiphon (Was: Bootstraping Tor manually to get past the Great Firewall)

Geoffrey Goodell goodell at eecs.harvard.edu
Mon Dec 4 04:44:14 UTC 2006


On Sun, Dec 03, 2006 at 10:24:20PM -0600, Arrakistor wrote:
> Speaking of Psiphon, anyone here familiar with I2P? This just popped
> up on my radar:
> 
> http://www.i2p.net/home
> 
> Thoughts?

Last I checked, I2P is a self-contained network that essentially uses a
technique similar to onion routing to provide access to
explicitly-established I2P services.  Thus, it might be thought of as
Tor-like system that allows access to hidden services but not to the
Internet at large.  I believe that the term used by the I2P authors for
systems (such as Tor) that provide anonymous access to existing Internet
services is "outproxy network."

More seriously, I2P is not well-documented.  It would be nice to learn
about its security properties, but I think that the Tor developers have
better things to do than reverse-engineer another system.

It is convenient to point the filesharing mavens to
I2P, but I am not convinced that there is a good argument for why I2P is
better than Tor for that purpose, at least at the level of actual code.
The purpose of the network and its preservation constitute another
story, however...

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20061203/365de3cb/attachment.pgp>


More information about the tor-talk mailing list