>>106240536
>>106240708
https://www.tandfonline.com/doi/full/10.1080/21642583.2017.1331770
To be fair, I2P isn't fully broken but it does suffer some issues as I have outlined above. There is also a german paper here
https://github.com/diva-exchange/academia/blob/main/research_studies/2022/De-Anonymisierung%20von%20Teilnehmern%20des%20I2P%20Netzwerkes/HSLU___BAA___Deanonymisierung_I2P.pdf
1) w/ I2P metadata is exposed to participating nodes, w/ Veilid this is not so.
2) Veilid increases anonymity by ensuring only neighboring hops are exposed at each stage, which offers an extra layer of protection beyond garlic routing.
3) I2P does not encrypt local storage, Velid does this. Meaning you do not have to rely on the security of others, Velid handles it for you.
4) Velid has flat peer equality, no specialized nodes. Also, I2P's use of floodfill reveals query patterns. A malicious router can log who is looking for what. This is also a bottlekneck for discovery.
To explain #4 further you would need to take over a much, much larger amount of nodes to break the anonymity in Veilid. The use of specialized nodes in I2P makes it so certain high value targets are all you really need to go after, making correlation attacks much easier than with Veilid.
>You deleted your double post
Indeed. I used the wrong image at first and you cannot delete a post immediately. It seems like it allows you to delete the post quicker if you post another first.