本页最后更新于 2018年5月。
网络数据库
播种
-
Are there any other ways to mitigate network brute-forcing via significant
floodfill control?
-
Is there any way to detect, flag and potentially remove 'bad floodfills'
similar to the Tor relay authorities, without actually needing to rely on a
form of central authority?
传输
-
How could packet retransmission strategies and timeouts be improved?
-
Is there a way for I2P to obfuscate packets and reduce traffic analysis
more efficiently than other proposed ideas? (Padding transport layer,
developing mimic protocols, etc.)
隧道和目标
对等节点选择
-
Is there a way that I2P could perform peer selection more efficiently or
securely?
-
Would it negatively impact anonymity to use geoip in order to prioritise
physically nearby peers for tunnel building? The primary goal would be to
increase tunnel success and reduce breakage.
双向隧道
- What are the benefits of unidirectional tunnels over bidirectional tunnels? What are the tradeoffs?
- More details are available here.
多宿主
- How effective is multihoming at load-balancing?
- How does it scale? What happens as more routers host the same Destination?
- The benefit for anonymity is less correlation of router uptime to Destination uptime. Are there tradeoffs?
消息路由
- How much is the effectiveness of timing attacks reduced by fragmentation and mixing of messages?
- What mixing strategies could I2P benefit from?
- How can high-latency techniques (e.g. message-dependent routing delays) be effectively employed within or alongside our low-latency network?
匿名性
-
How significantly does browser fingerprinting impact the anonymity of I2P
users? Would developing a browser package be beneficial for the average
user?
网络相关
-
What is the overall impact on the network created by 'greedy users' (users
who take bandwidth from the network without contributing any back
themselves)? Would additional steps for encouraging bandwidth
participation be valuable?