24c3-2260-en-to_be_or_i2p.mkv
- Type:
- Video > Other
- Files:
- 1
- Size:
- 92.86 MiB (97371394 Bytes)
- Uploaded:
- 2007-12-30 00:25 GMT
- By:
- num42
- Seeders:
- 0
- Leechers:
- 0
- Info Hash: D82A470C49E722CE5891EA170B036BA07134F6B9
http://events.ccc.de/congress/2007/Fahrplan/events/2260.en.html Speakers: Jens Kubieziel To be or I2P An introduction into anonymous communication with I2P I2P is a message-based anonymizing network. It builds a virtual network between the communication endpoints. This talk will introduce the technical details of I2P and show some exemplary applications. I2P has a different approach than most other known anonymous applications. Maybe you know about the anonymisation network Tor. Here you have central directory servers, onion routers (relaying traffic), onion proxies (send and receive data from the user) and other software roles within the network. I2P calls every software a router and it can send and receive data for the user as well as relay traffic for other users. Furthermore I2P uses no central server for distributing information about routers. You'll get the information from I2P's network database. This is a pair of algorithms which share the network metadata. The routers participate in the Kademlia algorithm. It is derived from distributed hash table. My talk will tell you in detail how I2P work, what roles routers, gateways, netDb etc. plays. Furthermore I'll show differences and similarities to other anonymizing networks e. g. Tor and introduce some exemplary applications.