Opt Out cover image

Network privacy via i2p w/ idk and Sadie

Opt Out

CHAPTER

Is There a Difference Between Tor and It P?

M i t p has evolved into more of an analysis resisting, pure t pure network that has built in meditating, obvusgating capabilities. The net d b itself requires a re key that happens between all flood fill routers at midnight u t c. And so if someone is conducting the most common type of sibil attack on i t p, they will no longer be positioned to block out your node as they say. But obviously you know what day it is going to be to morrow.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner