welcome

This website uses cookies to ensure you get the best experience on our website.
Please scroll to the bottom of page to read the notice if you are coming from the European Union...

Tuesday, December 22, 2015

New Player In The Privacy world

This is going to upset the private contractor watchers for sure!


The coders have been at it again.

There is a new player in town called 12P.

 All communication is end-to-end encrypted (in total there are four layers of encryption used when sending a message), and even the end points ("destinations") are cryptographic identifiers (essentially a pair of public keys), so that neither sender nor recipient of a message need to reveal their IP address to the other side or to third-party observers.

 Although both Tor and I2P are anonymity networks, there are some key differences. One of those differences is the greater degree of decentralization that I2P offers.

 If you're not using Tor, your location and activity is constantly being tracked. With Tor, the pitch goes, you're basically invisible.

 “Tor takes the directory-based approach - providing a centralized point to manage the overall 'view' of the network, as well as gather and report statistics, as opposed to I2P's distributed netwo​rk database and peer selection,” according to the I2P website

 Whereas Tor relies on a set of relays run by volunteers, and then people use their computer to connect to the network, I2P takes a peer-to-peer approach, and makes every user's computer a node in the network itself. “Essentially all peers participate in routing for others,” the I2P​ site reads.

 The “about” section of the I2P website reads very similarly to that of the Tor Project's.

 “I2P is used by many people who care about their privacy,” the site reads, “activists, oppressed people, journalists and whistelblowers, as well as the average person.”

This anonymous swarming is called 12P.

We don't recommend it. 

Tor has had more developers and more funding while 12P is new and has fewer developers and less funding.


And as always, nefarious types will utilize this technology to their advantage. 

So the cat and mouse syndrome continues as law enforcement has another layer to deal with in their never ending efforts to bring law and order.

The best way to use TOR is by using "Tails."

No comments:

Post a Comment