Changes between Version 55 and Version 56 of faq


Ignore:
Timestamp:
Aug 24, 2010 2:28:01 AM (9 years ago)
Author:
anonymous
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • faq

    v55 v56  
    2222 * __Is it safe? Has the code been audited? __
    2323
     24    * I2P is an open source project, and as such the source code is transparent and available for review. This of itself prevents back doors being slipped into the code, since anything suspicious would be subject to the review of the developers who would be quick to notice discrepancies. Furthermore, permission to commit sourcecode to our repository is conditional upon permission from our repository manager; there are only a handful of developers with such permission, which means the likelihood of "rogue" code is minimal. Given the nature of the project (protecting privacy online), security is at the forefront of the design, and is in a state of constant revision and improvement. We have yet to undergo a 3rd party review of the code, largely because no one has come forward to offer to audit it. In the event we secure significant funding, an independent audit of the code would be something we'd be interested to commission. If you're a java coder with a particular interest in cryptography, we'd welcome any code reviews and resultant suggestions to improve our security model. We cannot absolutely guarantee the saftey of the software; that we use it everyday ourselves here at I2P HQ should indicate a level of confidence.
     25
    2426   * ''duck: splendid stuff, suggest rephrasing to atleast mention privacy / anonymity. safe is too generic.''
    2527 
    2628 * __Is my router an "exit node" to the regular Internet? I don't want it to be.__
    2729
    28    * You're confusing Tor and I2P! By default, everyone on the network participates in the network to help route traffic for other I2P users. We do not configure an "outproxy" on a default installation, so the only traffic a default I2P installation will route will be for other I2P routers (nodes) within the network, encrypted and anonymous by design.
     30   * No! You're confusing Tor and I2P! By default an I2P installation will only ever route traffic within the network for others, rendering it unmonitorable by your ISP or government. Your ISP may notice that you're connecting over encrypted channels to other machines on the network, but the nature of those communications will be entirely undiscoverable. In I2P teminology, an "exit node" is what we call an "outproxy", or connection to the wider net. It's possible to function as an outproxy in I2P, similar to how exit nodes operate in Tor-land, but that requires manual configuration on the part of the I2P user.
     31   
     32   
     33   By default, everyone on the network participates in the network to help route traffic for other I2P users. We do not configure an "outproxy" on a default installation, so the only traffic a default I2P installation will route will be for other I2P routers (nodes) within the network, encrypted and anonymous by design.
    2934 
    3035 * __What is syndie and is it still active?__
    3136
    32     * Syndie is a distributed, decentralized forum platform specifically written for I2P. Development is ongoing, but currently the only way to install Syndie is through compiling it yourself from the mtn database. More information can be found at http://syndie.i2p2.de/
     37    * Syndie is a distributed, decentralized forum and blogging platform specifically written for I2P. Development is ongoing, but currently the only way to install Syndie is through compiling it yourself from the mtn database. More information can be found at http://syndie.i2p2.de/
    3338
    3439 * __I have a question! __