Files
i2p.itoopie/router/doc
jrandom 998f03ba68 killed the loops and the PRNGs by having the tunnel participants themselves specify what
tunnel ID they listen on and make sure the previous peer doesn't change over time.  The
worst that a hostile peer could do is create a multiplicative work factor - they send N
messages, causing N*#hops in the loop of bandwidth usage.  This is identical to the hostile
peer simply building a pair of tunnels and sending N messages through them.
also added some discussion about the tradeoffs and variations wrt fixed size tunnel messages.
2005-01-19 23:13:10 +00:00
..

$Id$

the i2p/router/ module is the root of the I2P
router, and everything within it is released 
according to the terms of the I2P license policy.  
That means everything contained within the 
i2p/router module is released into the public 
domain unless otherwise marked.  Alternate licenses 
that may be used include BSD, Cryptix, and MIT.