Changes between Version 37 and Version 38 of faq


Ignore:
Timestamp:
Aug 20, 2010 2:02:43 PM (9 years ago)
Author:
anonymous
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • faq

    v37 v38  
    6767 * __What do you mean by "no trusted parties"?__
    6868
    69     * No trusted parties is an expression used in cryptography/privacy circles to indicate the nature of a network. It means, in essence, that there is no centralized infrastructure that needs to be relied on (and trusted) for I2P to fucntion correctly, and furthermore, the design of I2P is explicitly such that centralized servers that assume critical roles withhin the network are not used. To compaore and contrast, Tor uses trusted parties for its "directory servers" to map the network topology.
     69    * No trusted parties is an expression used in cryptography/privacy circles to indicate the nature of a network. It means, in essence, that there is no centralized infrastructure that needs to be relied on (and trusted) for I2P to function correctly, and furthermore, the design of I2P is explicitly such that centralized servers that assume critical roles withhin the network are not used. To compare and contrast, Tor uses trusted parties for its "directory servers" to map the network topology.
    7070
    7171 * __Do I need to mess with my router to get I2P to work? Do I need to port forward to participate?__
     
    8080 
    8181 * __Is using an outproxy safe? (What are these inproxies and outproxies?)__
    82    * Inproxies are programms/websites which allows an user from the regular internet have a look into the anonymous network of I2P. So ... the opposite of this is an outproxy. An Outproxy allows you to visit websites of the regular internet through the anonymous network of I2P. Is it safe? It depends on what you are doing with that. Never use an unsecure connection (http w/out "s") to send privat data like username with passwords. The operator of an outproxy can log your informatione if he wants to do that. You don't know what happens with your information which leaves the I2P net through an outproxy. In I2P your connections are safe with encryption of your data. At the outproxy your information will be decrypted and send out unencrypted to the regular internet.
     82   * Inproxies are services which allows an user from the regular internet have a look into the anonymous network of I2P. So ... the opposite of this is an outproxy. An Outproxy allows you to visit websites of the regular internet through the anonymous network of I2P. Is it safe? It depends on what you are doing with that. Never use an unsecure connection (http w/out "s") to send privat data like username with passwords. The operator of an outproxy can log your informatione if he wants to do that. You don't know what happens with your information which leaves the I2P net through an outproxy. In I2P your connections are safe with encryption of your data. At the outproxy your information will be decrypted and send out unencrypted to the regular internet.
    8383
    8484 * __Steganography rants__
     
    9494 * __I am opposed to certain types of content. How do I keep from distributing, storing, or accessing them?__
    9595
    96     * Although I2P and Freenet share some characteristics, in I2P you are never obligated to store encrypted files for other users on the network; this is a Freenet feature. In terms of accesssing dubious content, the same rules apply as on the net at large: process with caution!
     96    * Although I2P and Freenet share some characteristics, in I2P you are never obligated to store encrypted files for other users on the network; this is a Freenet feature. In terms of accesssing dubious content, the same rules apply as on the net at large: proceed with caution!
    9797
    9898== In Operation ==