Review on Threat Model

Proposals for I2P
Post Reply
Obfuscate
Posts: 17
Joined: 27 May 2018 00:00

Review on Threat Model

Post by Obfuscate »

Free talk here. I am trying writing series of objective views about the threat model which needs to be updated.

Anyone finds wrong facts in my writing is welcomed to post.
Email: obfuscate@mail.i2p
GPG/Bote: http://zerobin.i2p/?f29cf44277405258#ZIy3CVcmTvaguHRv0MX6n7e43ttM49PmnFV5qT+N4eQ=
Obfuscate
Posts: 17
Joined: 27 May 2018 00:00

Re: Review on Threat Model

Post by Obfuscate »

These posts are mainly from the official documents and i2pwiki.i2p.

I'm going to propose some of the new attacks and possible solutions.

Part1.summaries
Part2.attacks and defenses.
Part3.Future works.
Email: obfuscate@mail.i2p
GPG/Bote: http://zerobin.i2p/?f29cf44277405258#ZIy3CVcmTvaguHRv0MX6n7e43ttM49PmnFV5qT+N4eQ=
Obfuscate
Posts: 17
Joined: 27 May 2018 00:00

Re: Review on Threat Model

Post by Obfuscate »

Part1-1

What do we mean by "anonymous"?

Your level of anonymity can be described as "how hard it is for someone to find out information you don't want them to know?" - who you are, where you are located, who you communicate with, or even when you communicate. "Perfect" anonymity is not a useful concept here - software will not make you indistinguishable from people that don't use computers or who are not on the Internet. Instead, we are working to provide sufficient anonymity to meet the real needs - the continued goal of I2P is to make attacks more and more difficult to mount. From those simply browsing websites, to those exchanging data, to those fearful of discovery by powerful organizations or states, I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.

Its anonymity will get stronger as the size of the network increases and with ongoing academic review.

The question of whether I2P provides sufficient anonymity for your particular needs is a hard one, but this page will hopefully assist in answering that question by exploring how I2P operates under various attacks so that you may decide whether it meets your needs.

We welcome further research and analysis on I2P's resistance to the threats described below. More review of existing literature (much of it focused on Tor) and original work focused on I2P is needed.
Email: obfuscate@mail.i2p
GPG/Bote: http://zerobin.i2p/?f29cf44277405258#ZIy3CVcmTvaguHRv0MX6n7e43ttM49PmnFV5qT+N4eQ=
Post Reply