紹介(日本語訳)

INTRODUCTION TO HOW I2P WORKS(英語)の非公式日本語訳です。翻訳を手伝ってくれる方大歓迎。
注意:このドキュメントはいくつかの変更点が加えられたり新しいトンネリング方法が加わったり暗号アルゴリズムが増えたりアドレスが若干変わったりしても滅多に更新はされません。

I2Pは安全で匿名なコミュニケーションを構築展開し維持することを助けます。People using I2P are in control of the tradeoffs between anonymity, reliability, bandwidth usage, and latency. There is no central point in the network on which pressure can be exerted to compromise the integrity, security, or anonymity of the system. The network supports dynamic reconfiguration in response to various attacks, and has been designed to make use of additional resources as they become available. もちろん, all aspects of the network are open and freely available.

Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the originator of some communication and not the recipient, or the other way around. I2P is designed to allow peers using I2P to communicate with each other anonymously — both sender and recipient are unidentifiable to each other as well as to third parties. For example, today there are both in-I2P web sites (allowing anonymous publishing / hosting) as well as HTTP proxies to the normal web (allowing anonymous web browsing). Having the ability to run servers within I2P is essential, as it is quite likely that any outbound proxies to the normal internet will be monitored, disabled, or even taken over to attempt more malicious attacks.

The network itself is message oriented - it is essentially a secure and anonymous IP layer, where messages are addressed to cryptographic keys (Destinations) and can be significantly larger than IP packets. Some example uses of the network include "eepsites" (webservers hosting normal web applications within I2P), a BitTorrent port ("I2PSnark"), or a distributed data store. With the help of mihi's I2PTunnel application, we are able to stream traditional TCP/IP applications over I2P, such as SSH, irc, a squid proxy, and even streaming audio. Most people will not use I2P directly, or even need to know they're using it. Instead their view will be of one of the I2P enabled applications, or perhaps as a little controller app to turn on and off various proxies to enable the anonymizing functionality.

An essential part of designing, developing, and testing an anonymizing network is to define the threat model, since there is no such thing as "true" anonymity, just increasingly expensive costs to identify someone. Briefly, I2P's intent is to allow people to communicate in arbitrarily hostile environments by providing militant grade anonymity, mixed in with sufficient cover traffic provided by the activity of people who require less anonymity. This includes letting Joe Sixpack chat with his buddies without anyone listening in, Jane Filetrader to share files knowing that large corporations cannot identify her, as well as Will Whistleblower to publish sensitive documents - all on the same network, where each one's messages are essentially indistinguishable from the others.

何故?


どのようにして?


いつ?


誰?


どこ?

タグ:

+ タグ編集
  • タグ:

このサイトはreCAPTCHAによって保護されており、Googleの プライバシーポリシー利用規約 が適用されます。

最終更新:2020年06月04日 10:03
ツールボックス

下から選んでください:

新しいページを作成する
ヘルプ / FAQ もご覧ください。