Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Sleeper Net Protocol?

Name: Anonymous 2014-05-30 6:52

Or i dunno... message in a bottle protocol / etc?

Basically just having one or more ports open, with read write access to a specified number of bytes in memory..?

It could be interesting? =D

Name: Anonymous 2014-06-01 0:01

>>27
I guess the only disadvantage this has over the tor model is i2p users get to find out the ips of some other i2p users. This can be done with tor as well as a malicious individual could run a tor entry node and record ips. But with the user -> user model it's as easy to find as bittorrent. But assuming the adversary can subvert isps, this doesn't matter anyways.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List