Changes between Version 15 and Version 16 of Content


Ignore:
Timestamp:
Jul 25, 2010 3:33:07 PM (9 years ago)
Author:
anonymous
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • Content

    v15 v16  
    4747Edit: Let's try and avoid the whole tubes metaphor. It's really not helpful.
    4848
    49 In I2P, everyone running the application helps everyone else, by default, anonymously. In order to hide your identity within the network, you bounce your traffic through other I2P-enabled machines, so your requests to view an I2P website, for example, go indirectly via other I2P machines, or routers. This works in similar fashion to Tor, but unlike Tor, everyone in the network helps everyone else, and you don't expose yourself to external monitoring by passing traffic to the external net. What happens in I2P stays in I2P! Furthermore, unlike Freenet (another P2P darknet implementation), you're not hosting encrypted content for other users, simply relaying their traffic, which from start to finish stays encrypted.
     49In I2P, everyone running the application helps everyone else, by default, anonymously. In order to hide your identity within the network, you bounce your traffic through other I2P-enabled machines, so your requests to view an I2P website, for example, go indirectly via other I2P machines (known as routers in I2P terminology, or nodes in Tor terms). This works in similar fashion to Tor, but unlike Tor, everyone in the network helps everyone else, and you don't expose yourself to external monitoring by passing traffic to the external net. What happens in I2P stays in I2P! Furthermore, unlike Freenet (another P2P darknet implementation), you're not hosting encrypted content for other users, simply relaying their traffic, which from start to finish stays encrypted.
    5050
    5151Additionally, no special magic is required to be an I2P router.. we implement technology similar to that used by Skype and other peer-to-peer applications to allow you to be part of the network even if you're behind restrictive firewalls or other systems that prevent inbound traffic from directly reaching your computer. No need to port forward on the router or open special ports, although if you can do so, you may see improved performance.