diff --git a/router/doc/techintro.html b/router/doc/techintro.html index 2d4c142a0..1a4e77201 100644 --- a/router/doc/techintro.html +++ b/router/doc/techintro.html @@ -17,7 +17,7 @@ pre { font-size: 10; font-family: sans-serif }
Introducing I2P
a scalable framework for anonymous communication
-$Id: techintro.html,v 1.3 2005/10/04 18:33:15 jrandom Exp $ +$Id: techintro.html,v 1.4 2005/10/04 18:34:19 jrandom Exp $

@@ -677,7 +677,7 @@ traffic data than would be exposed with Tor's duplex circuits by simply looking the flows themselves - an HTTP request and response would follow the same path in Tor, while in I2P the packets making up the request would go out through one or more outbound tunnels and the packets making up the response would come back through -one or more different inbound tunnels. While I2P's per selection and ordering +one or more different inbound tunnels. While I2P's peer selection and ordering strategies should sufficiently address predecessor attacks, I2P can trivially mimic Tor's non-redundant duplex tunnels by simply building an inbound and outbound tunnel along the same routers.

@@ -755,13 +755,13 @@ particular, the appropriateness for use in hostile regimes against state level adversaries has been tremendously overstated, and any analysis on the implications of resource scarcity upon the scalability of the network has seemingly been avoided. Specifically, while publishing the "anonymous" topology in the darknet does not -necessarily immediately expose all identities, it is equivilant to publishing an +necessarily immediately expose all identities, it is equivalent to publishing an organizational chart for a covert group, which can in turn be used by an adversary along side existing knowledge of their target to narrow down or identify different participants. In addition, by using only peers that are locally connected, the network's mixnet layer is vulnerable to a class of local view attacks. -Further questions regarding suceptability to traffic analysis, trust, and other topics +Further questions regarding susceptibility to traffic analysis, trust, and other topics do exist, but a more in depth review of this "globally scalable darknet" will have to wait until the Freenet team makes more information available.