I2P 🔴 🟡 🟢 on Nostr: npub1kvm4x…gs9cu I2P is not specifically designed to hide that a computer is ...
npub1kvm4xwm04u323k8he4m8dcr4ndyak8drrcrg5sdualplf6e96fhsngs9cu (npub1kvm…s9cu) I2P is not specifically designed to hide that a computer is running I2P. However, several design decisions made in the design of the transport layer make it difficult to identify I2P traffic:
Random port selection
Point-to-Point Encryption of all traffic
DH key exchange with no protocol bytes or other unencrypted constant fields
Simultaneous use of both TCP and UDP transports. UDP may be much harder for some Deep Packet Inspection (DPI) equipment to track
Published at
2024-03-20 12:39:05Event JSON
{
"id": "9ad0ef768eabb4063fe94eed976809d691efd586d94bd2c28443d59a8811458b",
"pubkey": "1ec38571f3bece27566ee44c769c955cf38ef94a5eb59f70fc3b9fbb5f51f691",
"created_at": 1710938345,
"kind": 1,
"tags": [
[
"p",
"b337533b6faf22a8d8f7cd7676e0759b49db1da31e068a41bcefc3f4eb25d26f",
"wss://relay.mostr.pub"
],
[
"p",
"ce1ba3266371cb3acbb401652e23b5779c6d6e70ae1fe49f20dec3b24cfa2db8",
"wss://relay.mostr.pub"
],
[
"e",
"56ddfa02b11bdec6728f241cddd9eff136fc32f3f1cad0e92829b8c3df19e9e4",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://mastodon.social/users/i2p/statuses/112128055411472384",
"activitypub"
]
],
"content": "nostr:npub1kvm4xwm04u323k8he4m8dcr4ndyak8drrcrg5sdualplf6e96fhsngs9cu I2P is not specifically designed to hide that a computer is running I2P. However, several design decisions made in the design of the transport layer make it difficult to identify I2P traffic:\n\nRandom port selection\n\nPoint-to-Point Encryption of all traffic\n\nDH key exchange with no protocol bytes or other unencrypted constant fields\n\nSimultaneous use of both TCP and UDP transports. UDP may be much harder for some Deep Packet Inspection (DPI) equipment to track",
"sig": "1c2c104a2862b74ec149ba1af2acfe9f08fd28a071f70805f6afddf07f7d5348a8499b1d10c565c6220a1f847b263987490dbf712e93ce0c6c153253f5eda9da"
}