CNC Customize Parts Professional Solution & Processing Provider

anonymity networks. don\'t use one, use all of them!

by:QY Precision      2019-09-07
The three anonymous networks on the Internet are Tor/Onionland, I2P and Freenet.
If you are confused about which one is the \"best\" to use the answer, the answer is simple. Use all three!
Each anonymous network is designed for different specific purposes.
A network cannot do what three networks can do together.
Tor and I2P cannot hold information like Freenet can, Tor, and Freenet, nor can they provide a universal transfer from I2P, nor can Freenet be like Tor and I2P
There is no better proxy system than Tor network.
Tor/OnionlandTor is an anonymous Internet agent.
You are acting through multiple Tor trunks, which eventually exit the trunk through Tor, which allows traffic to be exported from Tor to the Internet.
Tor is the most watched and supported.
The average user size on the Tor network is 100,000 to 200,000, the largest of the three users.
Tor also provides an anonymous intranet, often referred to as onionland.
Onionland uses the same method to connect to a machine identified by an encrypted public key.
In this way, you cannot easily determine the IP address of the machine.
Positive part of Tor/Onionland: negative part of Tor/Onionland: the best use of Tor is to proxy the general Internet anonymously.
FreeNetFreenet is an anonymous data publishing network, which is very different from Tor and I2P.
Freenet\'s latency is much higher, and more attention is paid to interactions with friends who are usually military-level security.
Play with an old internet meme. . .
Freenet is a big truck where you dump things while I2P is a series of tubes.
Freenet uses UDP, which is the \"oldest\" of the three networks \".
It is difficult to measure the size of Freenet because it is able to connect specifically with friends rather than strangers.
It is estimated to have about 20,000 active machines, but probably more.
The positive part of FreeNet: The negative part of Freenet: the best use is to publish content anonymously. I2P (
Invisible Internet Project
I2P is a distributed peer-to-peer anonymous network layer.
It allows you to send data between computers running I2P anonymously through multi-layer end-to-end encryption.
I2P from IIP (
Invisible IRC works)
This is one of FreeNet\'s sister projects.
The I2P focuses on internal communication rather than acting on the regular Internet.
I2P uses garlic routing to aggregate packets into larger packets.
The combination of garlic routing, multi-layer encryption, and packet random padding makes it very impractical, if not nearly impossible, to analyze the content of I2P traffic and detect the origin.
Depending on the time of day, I2P currently has 9,000 to 14,000 active machines.
Most nodes are either European or Russian.
The positive part of I2P: The negative part of I2P: the best use of i2P is for point-to-point file sharing and replacing the regular internet when it gets bad enough, in order to guarantee this action of the Phantom agreement that I can collect, the Phantom agreement is like this, a phantom.
After a long time, it has hardly made any progress in its development.
It seems to me to be vaporware and I have little to say about it.
No anonymous network can \"do anything \".
To get effective anonymity, you have to learn more than one tool.
Even if you learn how to use 3 networks correctly, there is a lot to learn.
Each network has different uses.
There are more tools that can be used with these networks to provide more features beyond this brief overview.
These tools include advanced ssh tunneling and configuration, personal vpn, and many command line tools that can do more than most regular users using GUI-based tools when they are used together.
Today\'s anonymous network, like the Internet in early 1990, is a \"relative of hackers\" and hopes to create a better tomorrow. Happy hacking.
Custom message
Chat Online
Chat Online
Chat Online inputting...
Sign in with: