On Mon, Dec 15, 2014 at 7:42 AM, str4d wrote:
> As far as the design goes, it is most similar to I2P's protocol. I
> have only read (most of) the original whitepaper[0] so far, and AFAICT
> at a high level it is almost identical to I2P, except for a few
> specific points (e.g. using IPv4 for ident
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
grarpamp wrote:
> On Sun, Dec 14, 2014 at 4:22 PM, Jonathan Wilkes
> wrote:
>> I'm asking here because it does onion routing, so maybe someone
>> here has investigated its design and/or implementation.
>
> Fully DHT decentralized routing, no exits,
On Sun, Dec 14, 2014 at 4:22 PM, Jonathan Wilkes wrote:
> Does anyone here know about the Phantom Protocol:
> https://code.google.com/p/phantom/
>
> It looks like it's abandonware, although someone sent a message to the list
> that they had done some tests with virtual machines.
The HESSLA is pro
Hi Tor people,
Does anyone here know about the Phantom Protocol:
https://code.google.com/p/phantom/
It looks like it's abandonware, although someone sent a message to the
list that they had done some tests with virtual machines.
My main question is this: how does it bootstrap?
I'm asking here
Any opinions:
http://www.reddit.com/r/coding/comments/g5e19/been_tracking_this_for_2_years_now_the_phantom/
?
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota