Fig 4 - uploaded by Juan Pablo Timpanaro
Content may be subject to copyright.
Bridge incoming/outgoing tunnels

Bridge incoming/outgoing tunnels

Source publication
Conference Paper
Full-text available
Anonymous communication has gained more and more interest from Internet users as privacy and anonymity problems have emerged. Dedicated anonymous networks such as Freenet and I2P allow anonymous file-sharing among users. However, one major problem with anonymous file-sharing networks is that the available content is highly reduced, mostly with outd...

Context in source publication

Context 1
... tunnels are formed by the I2P users and allow an indirect communication between two users. Figure 4 presents a simple tunnel- oriented I2P communication, in which Bob defines a 2-hop tunnel for its incoming and outgoing communications, while Alice defines a 0-hop tunnel. The anonymity of a user is based on the length of its tunnels: choosing the right length of a tunnel is a tradeoff between speed and anonymity that needs to be taken into consideration every time a user runs the I2P software. ...

Similar publications

Article
Full-text available
The influence of working memory load on visual selective attention was examined using a dual selective attention and working memory task. This dual task required participants to ignore distractor faces while categorizing superimposed celebrity names under low or high memory loads. Surprisingly, both memory load conditions produced equivalent interf...

Citations

Article
The I2P network has been widely used to protect user privacy via an open network of onion routers run by volunteers. To the best of our knowledge, the behavior of peers in the I2P network has not been well investigated in the existing researches. In this paper, we first present a simple and effective way to collect peers in the I2P network. Each day over 82% peers has been collected compared to the statistics from the statistics web site. With the data collected, we perform an empirical evaluation, revealing the phenomenon about IP address aliasing and identity aliasing. As identity aliasing makes bad impact on the availability and anonymity of the I2P network, we introduce family concept into the I2P network to mitigate the impact.