Opt Out cover image

Network privacy via i2p w/ idk and Sadie

Opt Out

00:00

Is There a Difference Between Tor and It P?

M i t p has evolved into more of an analysis resisting, pure t pure network that has built in meditating, obvusgating capabilities. The net d b itself requires a re key that happens between all flood fill routers at midnight u t c. And so if someone is conducting the most common type of sibil attack on i t p, they will no longer be positioned to block out your node as they say. But obviously you know what day it is going to be to morrow.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app