forked from I2P_Developers/i2p.www
new link
This commit is contained in:
@ -181,5 +181,10 @@ Mathias Ehlert,
|
||||
Humboldt University of Berlin,
|
||||
November 2011.
|
||||
|
||||
</li><li>
|
||||
<a href="http://how-to.linuxcareer.com/i2p-anonymity-for-the-masses">I2P - Anonymity for the Masses</a>,
|
||||
Jonathan Cox,
|
||||
November 11, 2011.
|
||||
|
||||
</li></ul></div>
|
||||
{% endblock %}
|
||||
|
@ -12,7 +12,7 @@ Pour toute demande d'adjonction à cette page, merci d'envoyer un message à pre
|
||||
<li><a href="http://www.businessweek.com/magazine/content/03_37/b3849089_mz063.htm">2003 Business Week article referencing invisiblenet</a>
|
||||
|
||||
</li><li>
|
||||
<a href="http://www.netzwelt.de/news/75371-i2p-das-anonyme-netz-im.html">Netzwelt.de article about being anonymous in the Internet</a><
|
||||
<a href="http://www.netzwelt.de/news/75371-i2p-das-anonyme-netz-im.html">Netzwelt.de article about being anonymous in the Internet</a>
|
||||
(German)
|
||||
November 2007.
|
||||
|
||||
@ -26,6 +26,8 @@ Jens Kubieziel, 24C3 Berlin, December 28, 2007.
|
||||
</li><li>
|
||||
<a href="http://www.gulli.com/news/i2p-an-anonymous-network-2009-03-09/">zzz interviewed by gulli.com</a>
|
||||
March 2009
|
||||
<a href="http://www.gulli.com/news/i2p-anonymes-netzwerk-im-2009-03-09/">German translation</a>
|
||||
<a href="http://translated.by/you/i2p-an-anonymous-network-interrogated/into-ru/">Russian translation</a>
|
||||
|
||||
</li><li>
|
||||
<a href="http://marge.informatik.tu-chemnitz.de/archiv/CLT2009/V4-Sa1200-Security-Lars_Schimmer.mp4">Video of I2P talk at Chemnitz Linux Tag</a>,
|
||||
@ -119,6 +121,7 @@ January 2011
|
||||
Adrian Crenshaw.
|
||||
Presented at Black Hat DC,
|
||||
January 18-19 2011
|
||||
<a href="http://translated.by/you/darknets-and-hidden-servers-identifying-the-true-ip-network-identity-of-i2p-service-hosts/into-ru/">Russian translation</a>
|
||||
|
||||
</li><li>
|
||||
<a href="http://www.irongeek.com/i.php?page=videos/shmoocon-firetalks-2011">Into the I2P Darknet: Welcome to Cipherspace</a>
|
||||
@ -135,13 +138,52 @@ I2P covered from 10:00 to 20:00 in the video.
|
||||
Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P,
|
||||
Michael Hermann.
|
||||
Master's Thesis, TU-Munich, March 28, 2011.
|
||||
Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P,
|
||||
<a href="http://grothoff.org/christian/i2p.pdf">Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P</a>,
|
||||
Michael Hermann, Christian Grothoff.
|
||||
Presented at PET Symposium, Waterloo Canada, July 27-29 2011.
|
||||
Presented at PET Symposium, Waterloo Canada, July 27, 2011.
|
||||
<a href="http://grothoff.org/christian/teaching/2011/2194/i2p.odp">presentation slides (odp)</a>
|
||||
|
||||
</li><li>
|
||||
Cipherspaces/Darknets: An Overview Of Attack Strategies,
|
||||
Adrian Crenshaw. DEF CON 19, Las Vegas, August 4-7, 2011.
|
||||
<a href="http://www.youtube.com/watch?v=bI_1qlcwfE0">Common Darknet Weaknesses</a>
|
||||
(Youtube Video)
|
||||
Adrian Crenshaw, <a href="http://aide.marshall.edu/">AIDE</a>, July 11-15, 2011.
|
||||
|
||||
</li><li>
|
||||
<a href="http://www.youtube.com/watch?v=NV90TRs_pGE">Short garlic routing animation</a>
|
||||
(Youtube Video)
|
||||
Adrian Crenshaw.
|
||||
|
||||
</li><li>
|
||||
<a href="http://www.irongeek.com/i.php?page=security/i2p-tor-workshop-notes">I2P / Tor Workshop Notes</a>
|
||||
Adrian Crenshaw. DEF CON 19, Las Vegas, August 6, 2011.
|
||||
|
||||
</li><li>
|
||||
<a href="http://www.youtube.com/watch?v=xxKXkbohRZM">Cipherspaces/Darknets: An Overview Of Attack Strategies -
|
||||
DEF CON Live version (Youtube Video)</a>,
|
||||
<a href="http://www.youtube.com/watch?v=xFxJ6Dc5ass">"Studio" version (Youtube Video)</a>,
|
||||
<a href="http://www.irongeek.com/downloads/Adrian-Crenshaw-darknet-weaknesses.pptx">Slides (ppt)</a>
|
||||
Adrian Crenshaw. DEF CON 19, Las Vegas, August 7, 2011.
|
||||
|
||||
</li><li><a href="http://www.isdpodcast.com/podpress_trac/web/2719/0/infosec-daily-podcast-episode-454.mp3">zzz interviewed on the InfoSec Daily Podcast (mp3)</a>
|
||||
(August 18, 2011)
|
||||
|
||||
</li><li>
|
||||
<a href="http://hal.inria.fr/inria-00632259/en/">Monitoring the I2P Network</a>,
|
||||
Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor,
|
||||
INRIA Nancy-Grand Est, France,
|
||||
LORIA - ESIAL, Henri Poincare University, Nancy 1, France.
|
||||
October 2011.
|
||||
|
||||
</li><li>
|
||||
<a href="http://userpage.fu-berlin.de/~semu/docs/2011_seminar_ehlert_i2p.pdf">I2P Usability vs. Tor Usability A Bandwidth and Latency Comparison</a>
|
||||
Mathias Ehlert,
|
||||
Humboldt University of Berlin,
|
||||
November 2011.
|
||||
|
||||
</li><li>
|
||||
<a href="http://how-to.linuxcareer.com/i2p-anonymity-for-the-masses">I2P - Anonymity for the Masses</a>,
|
||||
Jonathan Cox,
|
||||
November 11, 2011.
|
||||
|
||||
</li></ul></div>
|
||||
{% endblock %}
|
||||
|
Reference in New Issue
Block a user