
Network privacy via i2p w/ idk and Sadie
Opt Out
Is There a Difference Between Tor and It P?
M i t p has evolved into more of an analysis resisting, pure t pure network that has built in meditating, obvusgating capabilities. The net d b itself requires a re key that happens between all flood fill routers at midnight u t c. And so if someone is conducting the most common type of sibil attack on i t p, they will no longer be positioned to block out your node as they say. But obviously you know what day it is going to be to morrow.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.