@sadiedoreen
By the way, we have been using DFCA and found that a concerning number of firms are running nodes. One is (very conspicuously) running both (non-bridging nodes) and I2P nodes.

Are you aware of this?

#bigtechblocker #bigtech #i2p #tor #TrafficAnalysis #chainanalysis #bitcoin #dfca

Last updated 1 year ago

Also our testing indicates is and there is active censorship in the network, especially when may be able to identify who is using a connection.

We have tried multiple times to use and the connection cuts out about 1MB into the download everytime.

So its not just related.

This means Tor is no longer able to protect and in (elsewhere?).

Seems is a way forward.

@smallcircles @vegafjord

#tor #censorable #TrafficAnalysis #onionshare #exitNode #whistleblowers #journalists #australia #i2p #usei2p

Last updated 1 year ago

@redstarfish
is *probably* the only way you could possibly be , but we're not experts.

For example if the is a large file, a large adversary could watch the packets that come in and out of nodes in the network. They might even be able to temporarily close internet connections to test whether a download is continuing.

If the video is small we'd guess you are fairly safe.

may be a bit better than , in that packets are mixed up and nodes "fake" packets.

#TrafficAnalysis #tracked #video #i2p #tor

Last updated 4 years ago