[tor-talk] A Pluggable Transport based on i2p?

Mirimir mirimir at riseup.net
Wed Mar 15 18:57:28 UTC 2017

On 03/15/2017 10:36 AM, Jonathan Marquardt wrote:
> On Wed, Mar 15, 2017 at 06:20:53AM -0400, Lolint wrote:
>> Hi,
>> Could it be possible to implement a pluggable transport using i2p? The way this could work
>> is that a server would function as a bridge node, and will also have the i2p router installed,
>> and the client will connect to this bridge via I2P Tunnels,
>> <User><=><i2p network><=><bridge with i2p><=><Tor network><=><Clearnet or onion>
>> What do you think?
>> Thx
>> --Jeff
>> -- 
>> tor-talk mailing list - tor-talk at lists.torproject.org
>> To unsubscribe or change other settings go to
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> You want to hide the fact that you are using an anonymization network by using 
> an anonymization network. This idea seems pretty stupid to me.

Right. It would make sense, though, if you wanted to hide your identity
_from_ the anonymization network. Or more generally, as insurance.
You're OK if Tor gets pwned, or if I2P gets pwned. But you're still
pwned if network edges get pwned, so maybe not worth the latency hit.

More information about the tor-talk mailing list