create account

De-anonymizing I2P users by camb

View this thread on: hive.blogpeakd.comecency.com
· @camb · (edited)
$44.04
De-anonymizing I2P users
# Understanding a threat is key in choosing appropriate counteractions to take. 
![itoopie.png](https://steemitimages.com/DQmV2N6HvGd4MBazvauTRhWXTDte2beps5mhuVrHVFhx1yq/itoopie.png)

In my opinion I2P is a bit more interesting than Tor since in theory I2P should be more difficult to attack than Tor. In reality Tor has a larger community and has been reviewed and inspected more than I2P.

This is part of a white-paper I wrote on tracing users in an "anonymous" DHT network. For the following attack on I2P users the attacker will use multiple nodes and it's assumed the attacker has no previous idea who or where the victim is. 

# Attacking I2P users
The attackers router A keeps a fixed location  in keyspace and router B moves closer to the source with every intercepted insert or request by the victim. 

The attackers routers will have to wait until they are the final hop of an inbound or outbound tunnel of the victim's insert of a lease set before they will be able to determine a closer location of the victim's source in order to track eepsites. When running I2P-Bote an attacker can log and trace insert's and request's for a Bote ID. The attacker can recognize if a final hop was in the path of a victim since it will show a lease-set that can be associated with the victim's eepsite or Bote key.

##  Only 1 out of 3 times the attacker participates in the correct tunnel will it become the last hop since average tunnels are 3 hops. 

Becoming the final hop in a request's or insert's tunnel is necessary to recognize a destination and requires very high connectivity as the attackers chances of being part of a tunnel are lower the further away in keyspace the attacker is.


## By using "floodfill routers" for this attack on eepsites the required time will be reduced greatly since the attacker will be able to intercept newly inserted or requested lease sets 

By intercepting new lease set inserts to the netBD the attacker will be able to move significantly closer in the network before needing to worry about being the final hop in a tunnel. Only after the attacker has narrowed the victims keyspace down to a small enough area will he have to eventually become part of every hop in a relevant tunnel to be sure that the victim is located at a certain keyspace and IP.

# I am not trying to bash I2P at all 
By explaining how I2P can be attacked I hope I can point out how safe it actually is and convince more users to join the network. I2P works on desktops, servers and Android devices. Take a look if you are interested. https://geti2p.net 
![routerconsole-light.png](https://steemitimages.com/DQmW1WReihNGhbuaFuFgyem7yVjQWXCDovbbqy3SVvLjPGW/routerconsole-light.png)

Bottom line: I think I2p is pretty hard to attack. 

## Good luck out there friends. @camb
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and 26 others
properties (23)
authorcamb
permlinkde-anonymizing-i2p-users
categoryprivacy
json_metadata{"tags":["privacy","security","i2p","anarchy","anonymous"],"users":["camb"],"image":["https://steemitimages.com/DQmV2N6HvGd4MBazvauTRhWXTDte2beps5mhuVrHVFhx1yq/itoopie.png","https://steemitimages.com/DQmW1WReihNGhbuaFuFgyem7yVjQWXCDovbbqy3SVvLjPGW/routerconsole-light.png"],"links":["https://geti2p.net"],"app":"steemit/0.1","format":"markdown"}
created2017-02-26 00:21:18
last_update2017-02-26 03:50:54
depth0
children5
last_payout2017-03-29 11:42:57
cashout_time1969-12-31 23:59:59
total_payout_value33.056 HBD
curator_payout_value10.988 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length2,786
author_reputation2,733,578,557,743
root_title"De-anonymizing I2P users"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd0
post_id2,594,038
net_rshares78,025,660,422,712
author_curate_reward""
vote details (90)
@hagbardceline ·
Very interesting article. Have you already contacted the I2P developers about this issue?
properties (22)
authorhagbardceline
permlinkre-camb-de-anonymizing-i2p-users-20170226t113436079z
categoryprivacy
json_metadata{"tags":["privacy"],"app":"steemit/0.1"}
created2017-02-26 11:34:36
last_update2017-02-26 11:34:36
depth1
children4
last_payout2017-03-29 11:42:57
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length89
author_reputation9,539,931,063,329
root_title"De-anonymizing I2P users"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id2,596,812
net_rshares0
@camb ·
$5.43
Thank you. I think the I2P devs are well aware of this threat, but I will post a link to this article in the I2P forum. The I2P threat models are described in great detail here: https://geti2p.net/en/docs/how/threat-model
I had to write this article for myself to understand what it would take to de-anonymize an I2P user. At first it was all very confusing to me, but after I finally got my head wrapped around it I felt more confident about the security of the I2P network.
👍  , , , ,
properties (23)
authorcamb
permlinkre-hagbardceline-re-camb-de-anonymizing-i2p-users-20170226t190512415z
categoryprivacy
json_metadata{"tags":["privacy"],"links":["https://geti2p.net/en/docs/how/threat-model"],"app":"steemit/0.1"}
created2017-02-26 19:05:12
last_update2017-02-26 19:05:12
depth2
children3
last_payout2017-03-29 11:42:57
cashout_time1969-12-31 23:59:59
total_payout_value4.073 HBD
curator_payout_value1.357 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length475
author_reputation2,733,578,557,743
root_title"De-anonymizing I2P users"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id2,599,235
net_rshares26,129,288,570,586
author_curate_reward""
vote details (5)
@hagbardceline ·
Good idea. If possible, could you please also provide a link to the complete white-paper?
properties (22)
authorhagbardceline
permlinkre-camb-re-hagbardceline-re-camb-de-anonymizing-i2p-users-20170226t194100962z
categoryprivacy
json_metadata{"tags":["privacy"],"app":"steemit/0.1"}
created2017-02-26 19:41:00
last_update2017-02-26 19:41:00
depth3
children2
last_payout2017-03-29 11:42:57
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length89
author_reputation9,539,931,063,329
root_title"De-anonymizing I2P users"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id2,599,484
net_rshares0