Bitcoin Forum
May 13, 2024, 11:14:40 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 [3]  All
  Print  
Author Topic: Time to switch to i2P?  (Read 4237 times)
Cubic Earth
Legendary
*
Offline Offline

Activity: 1176
Merit: 1018



View Profile
November 11, 2014, 06:04:02 AM
Last edit: November 11, 2014, 06:14:26 AM by Cubic Earth
 #41

Fake data is just some real data padded and then encrypted. There is no way to distinguish the two apart without the decryption keys. The fake data is simply generated by the sender, and then discarded on the receiving end.

This reminds me of mp3's. Music used to be encoded as constant bit rate (CBR), now there are more variable bit rate (VBR) files. We are simply going backwards with the technology.
If you have a node that is receiving the data then you know what is fake (because you disregard it) and what is real (because you continue to relay it)

Excellent point.  Unfortunately.
1715598880
Hero Member
*
Offline Offline

Posts: 1715598880

View Profile Personal Message (Offline)

Ignore
1715598880
Reply with quote  #2

1715598880
Report to moderator
The forum strives to allow free discussion of any ideas. All policies are built around this principle. This doesn't mean you can post garbage, though: posts should actually contain ideas, and these ideas should be argued reasonably.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715598880
Hero Member
*
Offline Offline

Posts: 1715598880

View Profile Personal Message (Offline)

Ignore
1715598880
Reply with quote  #2

1715598880
Report to moderator
justusranvier
Legendary
*
Offline Offline

Activity: 1400
Merit: 1009



View Profile
November 11, 2014, 10:40:50 AM
 #42

If you have a node that is receiving the data then you know what is fake (because you disregard it) and what is real (because you continue to relay it)
Good thing we were talking about protecting against traffic analysis by a passive third party attacker instead of a peer.
deluxeCITY
Hero Member
*****
Offline Offline

Activity: 532
Merit: 500



View Profile
November 11, 2014, 06:21:59 PM
 #43

If you have a node that is receiving the data then you know what is fake (because you disregard it) and what is real (because you continue to relay it)
Good thing we were talking about protecting against traffic analysis by a passive third party attacker instead of a peer.
It is still a valid point and something that needs to be overcome in order to prevent your identity from being discovered by an attacker. If you only solve for one problem while ignoring others you are doing nothing to protect yourself.
justusranvier
Legendary
*
Offline Offline

Activity: 1400
Merit: 1009



View Profile
November 11, 2014, 06:55:43 PM
 #44

If you have a node that is receiving the data then you know what is fake (because you disregard it) and what is real (because you continue to relay it)
Good thing we were talking about protecting against traffic analysis by a passive third party attacker instead of a peer.
It is still a valid point and something that needs to be overcome in order to prevent your identity from being discovered by an attacker. If you only solve for one problem while ignoring others you are doing nothing to protect yourself.
https://wiki.freenetproject.org/Darknet

https://wiki.freenetproject.org/Papers#Small-world_networks
deluxeCITY
Hero Member
*****
Offline Offline

Activity: 532
Merit: 500



View Profile
November 12, 2014, 12:11:27 AM
 #45

If you have a node that is receiving the data then you know what is fake (because you disregard it) and what is real (because you continue to relay it)
Good thing we were talking about protecting against traffic analysis by a passive third party attacker instead of a peer.
It is still a valid point and something that needs to be overcome in order to prevent your identity from being discovered by an attacker. If you only solve for one problem while ignoring others you are doing nothing to protect yourself.
https://wiki.freenetproject.org/Darknet

https://wiki.freenetproject.org/Papers#Small-world_networks
Anything that reaches any kind of scale would potentially be vulnerable to an active attacker as "friend-of-friend" connections are visible so an attacker would need to become "friends" with popular nodes   
TechorMarketing
Full Member
***
Offline Offline

Activity: 174
Merit: 101


View Profile
June 01, 2016, 11:26:56 PM
 #46

Please support this I2P proposal on Stack Exchange:

https://area51.stackexchange.com/proposals/99297/i2p

Although the proposal was posted by a Monero developer it is meant to benefit the entire I2P community, not Monero specifically (Monero has its own Stack Exchange proposal already https://area51.stackexchange.com/proposals/98617/monero)

If you are interested in the C++ I2P router project  happening now you can track its progress here:
https://github.com/monero-project/kovri
Pages: « 1 2 [3]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!