Box clever.
This commit is contained in:
@ -63,7 +63,8 @@ allocation ("lease") of some tunnels that will be used for sending and receiving
|
||||
network. I2P has its own internal <a href="how_networkdatabase">network database</a> (using a modification of
|
||||
the Kademlia algorithm) for scalably distributing routing and contact information securely.</p>
|
||||
|
||||
<p><img src="/_static/images/net.png" alt="Network topology example" /></p>
|
||||
<p><center><div class="box"><img src="_static/images/net.png" alt="Network topology example" title="Network topology example" /></div></center></p><br>
|
||||
|
||||
|
||||
<p>In the above, Alice, Bob, Charlie, and Dave are all running routers with a single Destination on their
|
||||
local router. They each have a pair of 2-hop inbound tunnels per destination (labeled 1,2,3,4,5 and 6),
|
||||
@ -102,7 +103,7 @@ Notice the different use of terms! All data from a to h is end-to-end encrypted,
|
||||
between the I2P router and the applications is not end-to-end encrypted!
|
||||
A and h are the routers of alice and bob, while alice and bob in following chart are the applications running atop of I2P.</p>
|
||||
|
||||
<p><img src="/_static/images/endToEndEncryption.png" alt="end to end layered encryption" /></p>
|
||||
<center><div class="box"><img src="_static/images/endToEndEncryption.png" alt="End to end layered encryption" title="End to end layered encryption." /></div></center><br>
|
||||
|
||||
<p>The specific use of these algorithms are outlined <a href="how_cryptography">elsewhere</a>.</p>
|
||||
|
||||
|
@ -70,7 +70,7 @@ Tunneln, die zum Senden und Empfangen von Nachrichten durch das Netzwerk benutzt
|
||||
hat eine eigene <a href="how_networkdatabase">Netzwerk Datenbank</a> ("Floodfill") zum skalierbaren sicherem Verteilen von Routing
|
||||
und Kontaktinformationen.</p>
|
||||
|
||||
<p><img src="/_static/images/net.png" alt="Network topology example" /></p>
|
||||
<p><center><div class="box"><img src="_static/images/net.png" alt="Network topology example" title="Network topology example" /></div></center></p><br>
|
||||
|
||||
<p>Im oberen Bild betreiben Alice, Bob, Charlie und Dave je einen Router mit einer einzigen
|
||||
Destination auf ihren lokalen Router. Sie haben alle ein paar 2-Hop Eingangstunnel je
|
||||
@ -114,7 +114,7 @@ der Ende-zu-Ende Verschlüsselung von Router zu Router, Alice und Bob hingeg
|
||||
die mittels(unverschlüsseltem) I2CP mit den I2P Routern kommunizieren! Sprich: bis zum I2P Router
|
||||
sind die Daten unverschlüsselt, ab dem I2P Router ist alles Ende-zu-Ende verschlüsselt.</p>
|
||||
|
||||
<p><img src="/_static/images/endToEndEncryption.png" alt="end to end layered encryption" /></p>
|
||||
<center><div class="box"><img src="_static/images/endToEndEncryption.png" alt="End to end layered encryption" title="End to end layered encryption." /></div></center><br>
|
||||
|
||||
<p>Die genaue Anwendung dieser Algorhytmen sind <a href="how_cryptography">woanders</a> beschrieben.</p>
|
||||
|
||||
|
Reference in New Issue
Block a user