Advertisement
Guest User

cjdns sucks as a darknet, use i2p

a guest
Aug 31st, 2012
4,509
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 23.52 KB | None | 0 0
  1. Protip: nothing is 100% anonymous, you can throw away your anonymity is an instant
  2.  
  3.  
  4. 17:30 <+psi> step 1) please explain i2p
  5. 17:30 <+dg> you've gone from saying i2p sux in comparison to acting like cjdns is stupid
  6. 17:30 <@KillYourTV> so is it like onioncat/garlicat?
  7. 17:30 <+psi> step 2) please explain this other network
  8. 17:30 <+psi> step 3) compare and contrast
  9. 17:30 <+psi> you have the floor
  10. 17:30 <+dg> this should be good.
  11. 17:30 <+psi> go
  12. 17:31 * Meeh is excited to see what the answer is
  13. 17:31 <+iRelay> <jercos@freenode> i2p is a magical rainbow bridge to the future, over which a TCP-like socket can pass, with provisions to make sure it's super-secret, guyse.
  14. 17:31 -!- PrivacyHawk [amnesia@irc2p] has quit [Quit: leaving]
  15. 17:31 -!- PrivacyHawk [amnesia@irc2p] has joined #i2p-chat
  16. 17:31 <+psi> wrong
  17. 17:31 <+dg> correct
  18. 17:31 <+dg> no
  19. 17:31 <+dg> it's correct
  20. 17:32 <+psi> i2p i more than just tcp
  21. 17:32 < efkt> jercos: Oh. I see, you're not actually serious.
  22. 17:32 <+psi> actually read what i2p is first
  23. 17:32 <+iRelay> <jercos@freenode> cjdns is a complete well-defined network stack designed around the OSI model's vision of a network from physical up, designed to carry IP, which
  24. is
  25. commonly used with actual TCP and UDP.
  26. 17:32 <+psi> read about the garlic routing and the tunnels etc
  27. 17:33 <+psi> you do not have a proper undestanding of i2p
  28. 17:33 <+iRelay> <jercos@freenode> I said provisions didn't I?
  29. 17:33 <+psi> if you want i can do a full indepted explainaiont
  30. 17:33 <+iRelay> <jercos@freenode> If I'm describing Tor, I'm not gonna go into detail about how Onion routing works.
  31. 17:33 <+psi> fuck that vodka is getting to me
  32. 17:33 <+psi> i2p does not use anything from tor
  33. 17:33 <+iRelay> <jercos@freenode> Go for it.
  34. 17:33 <+psi> ok
  35. 17:34 <+psi> i2p is a message oriented anoynmous mixnet on the lowest layer
  36. 17:34 -!- lezhdraka_ [lezhdraka_@irc2p] has quit [Client exited]
  37. 17:34 <+iRelay> <jercos@freenode> mixnet?
  38. 17:34 <+psi> the main idea is that even when inside the network you cannot tell where messages are originally from or eventually going to, only the next hope
  39. 17:34 <+psi> yes
  40. 17:34 <+psi> a mixnet
  41. 17:35 <+iRelay> <jercos@freenode> That's a word I've seen, but wasn't really explained to my satisfaction.
  42. 17:35 <+psi> hold on just got started
  43. < harlock> hop
  44. 17:35 < harlock> we hope to reach the next hop :P
  45. 17:35 -!- RavenOUS [RavenOUS@irc2p] has joined #i2p-chat
  46. 17:35 -!- lezhdraka_ [lezhdraka_@irc2p] has joined #i2p-chat
  47. 17:35 <+iRelay> <jercos@freenode> Right. Feel free to ignore any questions I lay down until the end, I know you'll have read them, and I'll try to pipe down until you're done.
  48. 17:36 <+psi> with i2p the main conjecture is that i2p destinations can never be corrilated to an ip address
  49. 17:36 <+psi> if that is possible then i2p is broke
  50. 17:37 <+psi> so
  51. 17:37 -!- PrivacyHawk [amnesia@irc2p] has quit [Client exited]
  52. 17:37 <+psi> alice wants to talk to bobo
  53. 17:37 <+psi> bob*
  54. 17:37 <+psi> alice has bob's destination
  55. 17:37 <+psi> alice first builds what is called a tunnel
  56. 17:37 <+psi> a tunnel is simply put a path that a message takes
  57. 17:37 <+psi> it can have 0 to N hops
  58. 17:38 <+psi> current max N is 3
  59. 17:38 <+psi> (at this point)
  60. 17:38 <+psi> bob has a tunnel already built waiting to be connected to
  61. 17:38 -!- PrivacyHawk [amnesia@irc2p] has joined #i2p-chat
  62. 17:38 <+psi> he may have 2 hops or 0 hops alice does not know
  63. 17:38 -!- Leader-One [Leader-One@irc2p] has quit [Ping timeout]
  64. 17:38 -!- Leader-One_ [Leader-One@irc2p] has joined #i2p-chat
  65. 17:39 <+psi> alice builds a N hop tunnel and connects it to bob's
  66. 17:39 <+psi> this is 1 /2 of the transaction
  67. 17:39 <+psi> tunnels are unidirectional
  68. 17:39 <+psi> you can only send or recieve
  69. 17:39 <+psi> because of that
  70. 17:39 <+psi> in order for bob to get back to alice you need to verify that alice is really alice
  71. 17:40 <+psi> once that verification is done then bob connects back with the same processs to alice
  72. 17:40 <+psi> and that is 1 connection on i2p
  73. 17:40 <+psi> no tcp syn yet
  74. 17:41 <+psi> you can deny replying back with a tunnel based on rulesets, you can have a big whitelist of destinations that are allowed to be coonnected back to
  75. 17:41 <+psi> hence the term "invisble" internet
  76. 17:41 <+psi> you DONT know if the site is up or not you could just not be allowed to see it
  77. 17:42 <+psi> anyways back on track
  78. 17:42 <+psi> once this build tunnel to bob and bob back to alice is done the lifespan of this tunnel is 10 minutes max
  79. 17:42 <+psi> hence you are constantly building tunnels and switching them
  80. 17:43 <+psi> do you see how this varies GREATLY from cjdns?
  81. 17:43 <+psi> this is an ANONYMOUS MIXNET
  82. 17:43 <+psi> with a tcp and upd layer on top
  83. 17:43 -!- Bry8Star [Bry8Star@irc2p] has quit [Ping timeout]
  84. 17:43 <+psi> you CAN NEVER COMPARE this to cjdns
  85. 17:44 <+psi> cjdns is NOT ANYTHING close to i2p
  86. 17:44 <+psi> since tunnels criss cross over the same machines...
  87. 17:44 -!- Bry8Star [Bry8Star@irc2p] has joined #i2p-chat
  88. 17:44 <+psi> you hvae chances to bundle messages together into 1 big message
  89. 17:45 <+psi> the term garlic routing means to clump messages together and have them unpack like cloves of garlic
  90. 17:45 <+psi> this clumping and unclumping of messages makes traffic analysis practically impossbile
  91. 17:46 <+psi> jercos tell me how cjdns works
  92. 17:46 <+psi> (in your own words)
  93. 17:46 <+iRelay> <jercos@freenode> So you might be taking a totally different return path for the same connection?
  94. 17:46 <+psi> yes
  95. 17:46 <+psi> you are every time
  96. 17:46 <+psi> and it shifts every 10 minutes
  97. 17:46 <+dg> Simply us having a conversation here is resulting in loads of tunnels
  98. 17:46 <+dg> These messages are being sent through loads
  99. 17:47 <+dg> and iirc, you have tunnels which just sit there doing nothing, yes psi?
  100. 17:47 <+psi> yes tunnels dont need to hvae data
  101. 17:47 <+psi> they can just sit there
  102. 17:47 <+iRelay> <jercos@freenode> Okie-dokie-loki, my own words, here goes...
  103. 17:47 * efkt pokes a tunnel methodically
  104. 17:48 <+dg> on a side note psi, we could really do with some site like that drug one on Tor, simply to get us tested to hell and back -- although of course, it's illegal and
  105. that'd be
  106. bad for us, it'd still mean attention + lots of feds poking around trying to break things
  107. 17:48 <+iRelay> <jercos@freenode> cjdns's lowest layer implements a label switching system, where a variable length tag is added to a label to create a path describing an entire
  108. trip
  109. through the network from one endpoint to another
  110. 17:48 <+psi> dg: blackmarket.i2p
  111. 17:48 <+psi> also ssshhh respect
  112. 17:48 <+dg> sorry
  113. 17:48 <+iRelay> <jercos@freenode> in that sense it's very much non-anonymous, and more comparable to ethernet, however, that route may change without affecting traffic at all.
  114. 17:50 <+iRelay> <jercos@freenode> And I guess non-symmetric routes can easily exist, but I think there's some route searching optimization that uses the label reversal (the
  115. entire path
  116. is still described to the endpoint you reach, because at each hop the relevant label is removed, bit-reversed, and stuck on the other edge of the label, so a
  117. simple
  118. bit-reversal of the label will take you back to the origin of any message)
  119. 17:50 -!- anonymous534 [anonymous@irc2p] has joined #i2p-chat
  120. 17:50 -!- anonymous534 is now known as bobobobobob
  121. 17:51 <+iRelay> <jercos@freenode> I don't very well understand the routing protocol involved, though I've been told it's kademlia based, but nodes use their own cryptographic
  122. identity
  123. to sign advertisements of routes, with each node along the way adding the appripriate label to climb the network at each hop
  124. 17:53 <+psi> anything else or is the lag here?
  125. 17:54 < efkt> pong
  126. 17:54 <+psi> jercos still typing?
  127. 17:54 <+dg> ping
  128. 17:54 <+dg> possibly
  129. 17:54 <+psi> efkt dg thanks
  130. 17:54 < efkt> Cheers.
  131. 17:54 <+iRelay> <kytv@freenode> ping
  132.  
  133. 17:54 <+psi> pong
  134. 17:54 <@KillYourTV> k
  135. 17:55 <+iRelay> <kytv@freenode> ding
  136. 17:55 <+psi> dong
  137. 17:55 * efkt has to play tf2 now, thanks
  138. 17:55 < efkt> DING DONG
  139. 17:55 <+iRelay> <kytv@freenode> XD
  140. 17:55 <+psi> timeoout?
  141. 17:56 <+iRelay> <jercos@freenode> er, sorry, got called away to help a cow-orker.
  142. 17:56 <+psi> ah
  143. 17:56 <+dg> np
  144. 17:56 <+psi> so what you've described cjdns as is not an anonymity network but a way to verify that a route is reached to an endpoint without any anonymity involved
  145. 17:57 <+psi> shitty anonymity is an after effect
  146. 17:57 <+iRelay> <jercos@freenode> So anyway, for a given route, each node will have elected a single path based on latency, and established a CA session with the endpoint,
  147. generating a
  148. session key and handshaking using mutually cryptographic identities
  149. 17:57 <+iRelay> <jercos@freenode> each IPv6 address matches a key, and vice versa
  150. 17:57 <+psi> well... even anonymity
  151. 17:57 <+psi> not even*
  152. 17:57 <+iRelay> <jercos@freenode> Sure, like I said, no anonymity in the design.
  153. 17:57 <+psi> so dont compare it to i2p
  154. 17:57 <+psi> i2p is an anonymous mixnet
  155. 17:58 <+psi> it provides anonymiy
  156. 17:58 <+psi> fucking keyboard
  157. 17:58 <+dg> It's sad because people use it for i2p like qualities and it's not the same thing.
  158. 17:58 <+dg> <dg>IIn any case, it is more dangerous to be fucking up when you believe you have anonymity than when you fully believe you do not (thinking you have protected
  159. yourself when
  160. you haven't is more dangerous than knowing you're unsafe and moderating yourself accordingly)
  161. 17:58 <+psi> cjdns is being used like a non anonymous i2p
  162. 17:58 <+psi> and being advertised as an i2p
  163. 17:58 <+psi> THAT is the problem
  164. 17:58 <+dg> possibly with psuedo-anonymity which is.. bad.. very bad
  165. 17:58 <+dg> ^^
  166. 17:58 <+iRelay> <jercos@freenode> But I mean, that's what it is.
  167. 17:59 <+psi> there is NO anonymity on cjdns so please do NOT compare it to i2p
  168. 17:59 <+psi> i2p is anonymity centric
  169. 17:59 <+iRelay> <jercos@freenode> It's a non-anonymous i2p. it's a private network, authenticated end to end, carrying a service, and happens to not expose your IP, no matter if
  170. you're
  171. consuming or providing a service
  172. 17:59 <+psi> cjdns is just another cute darknet
  173. 17:59 <+dg> I'm all for cute darknets, but i2p is something different, and really, we could do with the users
  174. 18:00 <+psi> i2p is ultra fucking cryptopgraphic noise machine
  175. 18:00 <+psi> cjdns can not compare
  176. 18:00 <+dg> i2p has an amazing amount of potential, so when some other project comes along, claims they can do things which we can (when they can't/we can do better), is
  177. annoying.
  178. 18:00 <+psi> please dont compare
  179. 18:00 <+dg> i'm all for cjdns in the right places
  180. 18:00 <+iRelay> <jercos@freenode> chugga chugga steam powered anonymity
  181. 18:00 <+psi> except cjdns has no anonymtiy
  182. 18:00 <+iRelay> <jercos@freenode> All the right anonymity in all the right places.
  183. 18:01 <+psi> as you said back there
  184. 18:01 <+psi> It's a non-anonymous i2p
  185. 18:01 <+iRelay> <jercos@freenode> There has been a lot of discussion about running tor on cjdns, for that matter I don't see how i2p and cjdns wouldn't want to co-exist even.
  186. 18:01 <+psi> cjdns is being used incorrectly
  187. 18:01 <+psi> it's real potential is in connecting those without internet to the intenret
  188. 18:01 <+dg> i2p could definitely run on cjdns, but cjdns is for bridging over to places which do not have real internet
  189. 18:01 <+dg> It isn't some makeshift darknet, replacement for i2p
  190. 18:02 <+psi> cjdns is fucking weak vs i2p
  191. 18:02 <+psi> cjdns is NOT meant to be used as a darknet
  192. 18:02 <+psi> EVER
  193. 18:02 <+dg> the guy who came up with i2p is a fucking genius
  194. 18:02 <+psi> cjdns is nice too
  195. 18:02 < efkt> Huh. Guys, I can run a private tor based network (for example, within a vpn), can I do the same with i2p to a relatively easy degree?
  196. 18:02 <+psi> but it's not being used right
  197. 18:03 <+dg> efkt: good question. I was thinking about that also.
  198. 18:03 <+iRelay> <jercos@freenode> Well it does very much fit the friend to friend model of a darknet
  199. 18:03 <+psi> dg: talk with Meeh
  200. 18:03 <+psi> no not even close
  201. 18:03 < efkt> Because then garlicat would be hella fun, wouldnt it
  202. 18:03 <+iRelay> <jercos@freenode> cjdroute doesn't advertise its existance in any way unless a CA is set up.
  203. 18:03 <+psi> it does not even come close to i2p
  204. 18:03 <+iRelay> <jercos@freenode> If you don't have the password or the key connecting in, cjdroute is quiet.
  205. 18:03 <@KillYourTV> efkt: That should be possible. There's possibly a guide somewhere on zzz.i2p
  206. 18:04 <+iRelay> <jercos@freenode> woah woah, sicne when is i2p "the darknet"?
  207. 18:04 <+dg> also, cjdns is a bad idea in some respects :p
  208. 18:04 <+psi> cjdns is NOT anonymous, i2p is
  209. 18:04 <+dg> you have no plausible edniability
  210. 18:04 <+iRelay> <jercos@freenode> I wasn't saying "cjdns is i2p", I was saying "cjdns is a darknet"
  211. 18:04 <+dg> this message /definitely/ came from me!
  212. 18:04 <+dg> hahaha
  213. 18:04 <+iRelay> <jercos@freenode> as we've outlined, not an anonymous darknet
  214. 18:04 <+dg> does nobody else see the problem with this?
  215. 18:04 <+iRelay> <jercos@freenode> but it is in fact, a network that from the outside appears dark, and only spreads through direct peering.
  216. 18:04 <+psi> why the hell would you want an non anonymous darknet? it defeats the whoole purpose of a darknet.
  217. 18:04 <+iRelay> <jercos@freenode> Well, the problem doesn't really exist IMO.
  218. 18:05 <+psi> the anonymity aspect is the part that protects you in a darknet
  219. 18:05 <+iRelay> <jercos@freenode> It's the same sort of concept with Frost, you have to be able to build an identity
  220. 18:05 <+iRelay> <jercos@freenode> you can make a new identity in a split second, then throw it away when you're done.
  221. 18:05 <+dg> arguably in i2p, you don't have a real identity
  222. 18:05 < cipher> its a meshnet, not a darknet
  223. 18:05 <+psi> frost is something entirely differnt
  224. 18:05 <+psi> cipher: that
  225. 18:05 <+psi> meshnet != darknet
  226. 18:05 <+dg> I could throw dg away in a few seconds
  227. 18:05 <+iRelay> <jercos@freenode> Right, it's not a darknet that protects you from others on the darknet
  228. 18:05 <+psi> meshnets are best used to connect stuff to the internet
  229. 18:05 <+dg> .
  230. 18:05 <+iRelay> <jercos@freenode> I don't see that as being part of the definition of a darknet.
  231. 18:05 <+dg> that's not the darknets job LOL
  232. 18:06 <+dg> darknets are not firewalls
  233. 18:06 <+psi> what cjdns provides is perfect for what it's NOT being used for
  234. 18:06 <+psi> cjdns is being used in a totally incorhiernt manner
  235. 18:06 <+iRelay> <jercos@freenode> a darknet is just a network that you can't join unless you know someone on it, right?
  236. 18:06 <+dg> no
  237. 18:06 <+dg> it is not
  238. 18:06 <+psi> dg: cjdns is a routing engine
  239. 18:06 <+dg> not @ you, psi
  240. 18:07 <+dg> <iRelay> <jercos@freenode> a darknet is just a network that you can't join unless you know someone on it, right?
  241. 18:07 < cipher> not really
  242. 18:07 <+iRelay> <jercos@freenode> well, wikipedia tells me the term darknet only applies to filesharing services, so obviously I can't use that definition :|
  243. 18:07 < cipher> youre thinking of a F2F network
  244. 18:07 <+psi> in application cjdns is best for connecting parts of the world without internet to the internet
  245. 18:07 <+dg> I joined i2p and I didn't know anyone on it beforehand.
  246. 18:07 <+psi> yet it's not being used for that
  247. 18:07 < cipher> ^^
  248. 18:07 <+psi> it's being used to connect people on the internet
  249. 18:07 <+psi> it makes no sense
  250. 18:07 <+iRelay> <jercos@freenode> cjdns is a routing engine *and* a physical VPN, *and* an end to end encrypted tunnel
  251. 18:08 <+psi> the current application of cjdns is nonsensical
  252. 18:08 <+dg> If you want anonymity or to have that cool crypto factor, or both, i2p is what you want.
  253. 18:08 <+iRelay> <jercos@freenode> well where is the term darknet firmly defined?
  254. 18:08 <+psi> and claiming it has anonymity is a lie
  255. 18:08 <+dg> If you think i2p hasn't got enough content or whatever, that is irrelevant.
  256. 18:08 -!- zab_afk is now known as zab_
  257. 18:08 <+psi> if you want content go onto the internet
  258. 18:08 <+psi> or 4chan
  259. 18:08 <+psi> you find a lot of stuff there
  260. 18:08 < cipher> I think TCX defines darknet best
  261. 18:08 <+psi> no anonymtiy
  262. 18:08 <+iRelay> <jercos@freenode> But if I pick up the cool crypto factor from i2p, I'm not longer using IP.
  263. 18:08 <+psi> but lots of stuff
  264. 18:08 <+iRelay> <jercos@freenode> no longer*
  265. 18:08 <+dg> what
  266. 18:09 <+dg> why do you need to be using ip
  267. 18:09 -!- Lyrise [lyrise@irc2p] has quit [Client exited]
  268. 18:09 <+dg> i don't understand why it's required
  269. 18:09 <+psi> what are you using ipx?
  270. 18:09 -!- bobobobobob is now known as bo
  271. 18:10 -!- Lyrise [lyrise@irc2p] has joined #i2p-chat
  272.  
  273. === HIGHLIGHT ===
  274. 18:10 <+psi> main beef with cjdns is that it's being used as reddit's toy and not being deployed where it would be more useful
  275. =================
  276.  
  277. 18:10 <+dg> yup
  278. 18:11 <+dg> let me uh.. hang on.
  279. 18:11 <+dg> http://www.reddit.com/r/darknetplan
  280. 18:11 <+dg> It calls cjdns an alternative to the internet
  281. 18:11 <+iRelay> Title: Meshnet Plan (at www.reddit.com)
  282. 18:11 <+psi> cjdns is NOT an alternative to the internet in any way
  283. 18:12 <+psi> it's a way to connect people with out internet to the main net easily
  284. 18:12 <+psi> that is what it is DESIGNED to do BEST
  285. 18:12 <+dg> http://www.reddit.com/r/darknetplan/comments/yrxn3/no_fing_way_this_is_exactly_what_we_dont_want/ - proof.
  286. 18:12 <+psi> but sadly reddit is playing darknet with it
  287. 18:12 <+dg> They're trying to go for an alternative, resistant to attacks network
  288. 18:12 <+dg> That is *NOT* cjdns.
  289. 18:13 <+psi> in fact it's i2p
  290. 18:13 <+psi> and we've been TRYING to explain it but everyone is like "no gtfo we use cjdns"
  291. 18:13 <+dg> "Tor and I2P do a really good job anonymizing the existing internet, at the cost of locking down what you can do with it to the small set of services included in the
  292. anonymizer. CJDNS does a good job at creating a secure virtual internet, protected from DDoS and censorship, but not very anonymous (more pseudonymous, like Bitcoin).
  293. CJDNS
  294. is also a lot more flexible, though the lack of exit nodes is an irritant to some people."
  295. 18:13 <+dg> lol
  296. 18:13 -!- bo [anonymous@irc2p] has quit [irc.postman.i2p irc.freshcoffee.i2p]
  297. 18:13 -!- Leader-One_ [Leader-One@irc2p] has quit [irc.postman.i2p irc.freshcoffee.i2p]
  298. 18:13 -!- PrivacyHawk [amnesia@irc2p] has quit [irc.postman.i2p irc.freshcoffee.i2p]
  299. 18:13 -!- lezhdraka_ [lezhdraka_@irc2p] has quit [irc.postman.i2p irc.freshcoffee.i2p]
  300. 18:13 -!- harlock [harlock@irc2p] has quit [irc.postman.i2p irc.freshcoffee.i2p]
  301. 18:13 -!- Complication2 [Complicati@irc2p] has quit [irc.postman.i2p irc.freshcoffee.i2p]
  302. 18:13 -!- primal- [primal@irc2p] has quit [irc.postman.i2p irc.freshcoffee.i2p]
  303. 18:13 -!- iRelay [i2prelay@irc2p] has quit [irc.postman.i2p irc.freshcoffee.i2p]
  304. 18:13 -!- anon1 [anon@irc2p] has quit [irc.postman.i2p irc.freshcoffee.i2p]
  305. 18:13 -!- kytvz [kytv@irc2p] has quit [irc.postman.i2p irc.freshcoffee.i2p]
  306. 18:13 -!- welterde [anon@irc2p] has quit [irc.postman.i2p irc.freshcoffee.i2p]
  307. 18:13 <+dg> "secure virtual internet"
  308. 18:14 <+dg> http://www.reddit.com/r/darknetplan/comments/ywkoj/eli5_tor_vs_cjdns_vs_i2p/c5zpwnr - ugh
  309. 18:15 <+dg> http://www.reddit.com/r/darknetplan/comments/yfeum/newb_question_the_mesh_meets_internet/c5vgcj0
  310. 18:15 <+dg> "So basically what I am getting at with this thread is a sort of guerrilla style internet. Ye olde BBS meets HAM radio kinda thing, but obviously much more robust.
  311. Again I
  312. am new to this, so bare with me. "
  313. 18:15 < efkt> -.-
  314. 18:15 -!- bo [anonymous@irc2p] has joined #i2p-chat
  315. 18:15 -!- Leader-One_ [Leader-One@irc2p] has joined #i2p-chat
  316. 18:15 -!- PrivacyHawk [amnesia@irc2p] has joined #i2p-chat
  317. 18:15 -!- lezhdraka_ [lezhdraka_@irc2p] has joined #i2p-chat
  318. 18:15 -!- harlock [harlock@irc2p] has joined #i2p-chat
  319. 18:15 -!- Complication2 [Complicati@irc2p] has joined #i2p-chat
  320. 18:15 -!- primal- [primal@irc2p] has joined #i2p-chat
  321. 18:15 -!- iRelay [i2prelay@irc2p] has joined #i2p-chat
  322. 18:15 -!- anon1 [anon@irc2p] has joined #i2p-chat
  323. 18:15 -!- kytvz [kytv@irc2p] has joined #i2p-chat
  324. 18:15 -!- welterde [anon@irc2p] has joined #i2p-chat
  325. 18:15 -!- ServerMode/#i2p-chat [+v iRelay] by irc.freshcoffee.i2p
  326. 18:15 <+dg> <dg> "Tor and I2P do a really good job anonymizing the existing internet, at the cost of locking down what you can do with it to the small set of services included in
  327. the
  328. anonymizer. CJDNS does a good job at creating a secure virtual internet, protected from DDoS and censorship, but not very anonymous (more pseudonymous, like Bitcoin).
  329. CJDNS
  330. is also a lot more flexible, though the lack of exit nodes is an irritant to some people."
  331. 18:15 <+dg> <dg> lol
  332. 18:15 <+dg> [[netsplit]]
  333. 18:15 <+dg> <dg> "secure virtual internet"
  334. 18:15 <+dg> <dg> http://www.reddit.com/r/darknetplan/comments/ywkoj/eli5_tor_vs_cjdns_vs_i2p/c5zpwnr - ugh
  335. 18:15 <+dg> <dg> http://www.reddit.com/r/darknetplan/comments/yfeum/newb_question_the_mesh_meets_internet/c5vgcj0
  336. 18:16 <+dg> <dg> "So basically what I am getting at with this thread is a sort of guerrilla style internet. Ye olde BBS meets HAM radio kinda thing, but obviously much more
  337. robust.
  338. Again I am new to this, so bare with me. "
  339. 18:16 <+iRelay> <jercos@freenode> >.>
  340. 18:16 <+iRelay> Title: Rainfly_X comments on ELI5 - TOR vs CJDNS vs I2P (at www.reddit.com)
  341. 18:16 <+iRelay> Title: UStud88 comments on Newb question: The mesh meets internet (at www.reddit.com)
  342. 18:16 <+psi> oh god
  343. 18:16 <+dg> We need to educate them
  344. 18:17 <+iRelay> <jercos@freenode> >pseudonymous
  345. 18:17 <+iRelay> <jercos@freenode> that would be the word I was looking for when i said semi-anonymous.
  346. 18:17 <+dg> The rest of it is bad.
  347. 18:17 <+dg> That was the only really good part of it
  348. 18:17 <+dg> They actually said pseudonymous
  349. 18:19 <+iRelay> <jercos@freenode> :p
  350. 18:24 -!- albator [hey@irc2p] has quit [Quit: leaving]
  351. 18:27 <@KillYourTV> ping
  352. 18:27 <+iRelay> <kytv@oftc> pong
  353. 18:27 < efkt> pong
  354. 18:27 <+dg> ping
  355. 18:28 <+iRelay> <kytv@oftc> ding
  356. 18:28 <+iRelay> <kytv@oftc> pong
  357. 18:28 <+iRelay> <kytv@freenode> lag's not too bad...
  358. 18:28 -!- Complication3 [Complicati@irc2p] has joined #i2p-chat
  359. 18:28 -!- Complication2 [Complicati@irc2p] has quit [Ping timeout]
  360. 18:29 <+iRelay> <kytv@oftc> ...considering to <---> from freenode & oftc is via Tor
  361. 18:29 -!- Lyrise [lyrise@irc2p] has quit [Ping timeout]
  362. 18:30 <+psi> pseudoanoymity is poor anonymity
  363. 18:30 <+psi> cjdns sucks at anonymity
  364. 18:30 -!- anon1 [anon@irc2p] has quit [Ping timeout]
  365. 18:30 <+psi> according to all this
  366. 18:30 -!- anon1 [anon@irc2p] has joined #i2p-chat
  367. 18:31 <+dg> psi: it's becoming apparent we /really/ should tell them
  368. 18:31 * psi makes pastes of conversation with permission of those involved for educational purposes
  369. 18:31 -!- jaj1 [kk@irc2p] has quit [Ping timeout]
  370. 18:31 -!- Lyrise [lyrise@irc2p] has joined #i2p-chat
  371. 18:31 * dg gives permission
  372. 18:31 <+psi> frenode guy ok with you?
  373. 18:32 -!- kiribati [i2p@irc2p] has quit [Ping timeout]
  374. 18:32 -!- kiribati [i2p@irc2p] has joined #i2p-chat
  375. 18:32 -!- mode/#i2p-chat [+v kiribati] by chanserv
  376. 18:32 <+psi> jercos?
  377. 18:32 -!- efkt [efkt@irc2p] has quit [Quit: leaving]
  378. 18:33 -!- efkt [efkt@irc2p] has joined #i2p-chat
  379. 18:33 -!- testudo [testudo@irc2p] has joined #i2p-chat
  380. 18:34 <@KillYourTV> &relay nicks
  381. 18:34 <+iRelay> freenode (6): iRelay, jercos, kytv, Mango2, mikalv, welterde; kytv (5): @iRelay, @KillYourTV, @MrGarrison, @ReturningNovice_, nick; oftc (2): @iRelay, kytv
  382. 18:34 -!- jaj1 [kk@irc2p] has joined #i2p-chat
  383. 18:36 -!- Bitume [Bitume@irc2p] has quit [Ping timeout]
  384. 18:36 -!- Bitume [Bitume@irc2p] has joined #i2p-chat
  385. 18:39 <+iRelay> <jercos@freenode> You have my permission to replay my words elsewhere, so long as they are not modified.
  386. 18:39 <+iRelay> <jercos@freenode> Erm, relay.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement