Oddbean new post about | logout
 None of those points really apply to I2P.
-Non persistant tunnels as opposed to persistent TOR circuits
-The inproxy/outproxy model at minimum doubles the amount of "nodes" that would need to be captured for "unmasking" even then it is packet switched.
-IRC routed through I2P is absolutely not like a TOR proxy.