ANONCOIN


Anoncoin - ANC


What is Anoncoin?
Anoncoin is a coin with active development support which focus on Anonymity. It was forked out of Litecoin, but have since catched up with the Bitcoin 0.8.5.3 source, and taken it’s own way.

The I2P Network?

I2P is a scalable, self organizing, resilient packet switched anonymous network layer, upon which any number of different anonymity or security conscious applications can operate.
I2P is an open source project developed in early 2003 by a group of full time developers with a group of part time contributors from all over the world.
It is fundamental to understand that inside an I2P network the “hidden” component is represented by an application in execution on the node doing, and of course the path followed by the information to reach the destination. Another important concept for I2P is the “tunnel”, a directed path which extends through an explicitly selected list of routers. The first router that belongs to a tunnel is named “gateway”.
The communication within a tunnel in unidirectional, this means that it is impossible to send back data without using another separated tunnel.
Also for I2P a layered encryption model is implemented, known as “garlic routing” and “garlic encryption”, the information transits on network routers that are able to decrypt only the respective layer.

I2P Routing?

When Alice wants to send a message to Bob, she does a lookup in the netDb to find Bob’s leaseSet, giving her his current inbound tunnel gateways.
Alice’s router aggregates multiple messages into a single “garlic message”, encrypting it using a particular public key, in this way only the public key owner can open the message.
For typical end to end communication between Alice and Bob, the garlic will be encrypted using the public key published in Bob’s leaseSet, allowing the message to be encrypted without giving out the public key to Bob’s router.
She selects one of her outbound tunnels and sends the data include of necessary instructions message and with instructions for the outbound tunnel’s endpoint to forward the message on to one of Bob’s inbound tunnel gateways. When the outbound tunnel endpoint receives those instructions, it forwards the message according the instructions provided, and when Bob’s inbound tunnel gateway receives it, it is forwarded down the tunnel to Bob’s router.
Be aware, we have said that transmission is unidirectional, this means that if Alice wants Bob to be able to reply to the message, she needs to transmit her own destination explicitly as part of the message itself.
I2P is end-to-end encryption. No information is sent in clear or decrypted during its path including the sender and recipient. To each node is assigned an internal network address different from the network IP address that isn’t used.

Layered Encryption

The term layered encryption refers to the encryption process used during the transfer from a source to the destination through a series of peers that composes the tunnel.
Both Tor and I2P use layered cryptography. Intermediate entities have only to know how to forward the connection on to the next hop in the chain but cannot decipher the contents of the connections.
I2P is end to end encryption. No information is sent in clear or decrypted along its path, including the sender and recipient. To each node is assigned an internal network address different from the network IP address that isn’t used.
I2P uses cryptographic ID to identify both routers and end point services, for naming identifiers is used the “Base 32 Names” techniques that attributes a SHA256 digest to the base64 representation of the destination. The hash is base 32 encoded and “.b32.i2p” is concatenated onto the end of the hash.

Garlic Routing

Garlic Routing is very similar to onion routing with several differences. Let’s consider first of all that in garlic routing, it is possible to aggregate multiple messages. Another difference from Tor is that the tunnels are unidirectional.
Garlic routing in I2P is adopted mainly in three distinguished phases:
1. For building and routing through tunnels (layered encryption). In I2P communication tunnels are unidirectional; this means that each interlocutor has to create a couple of tunnels, one for outbound and one for inbound traffic. There is also the possibility of a reply from the recipient, therefore another couple of tunnels must be created for a total of four tunnels.
2. For bundling, determining the success or failure of end to end message delivery.
3. For publishing some network database entries.

Subscribe For Latest Informations


0 komentar:

Post a Comment