Sadly, outside of torrenting I2P doesn't seem to have much traction, losing out to the better funded tor project
Sadly, outside of torrenting I2P doesn't seem to have much traction, losing out to the better funded tor project
And then you repeat that a couple of times at random places. If you don't want to kill people, the first bombs should be duds, but occasionally some of the later bombs should be real, so they don't let down the guard, but learn to fear the repair jobs.
Then after that, EVERY SINGLE repair job, even when you didn't actually sabotage it yourself, would become super-expensive and take lots-and-lots of time.
After you trained them, you can lower the number of sabotages with mostly duds, and the occasional real bomb, to just once every couple of months. They still need to handle every single repair job as if you had been there. Minimal cost for you, maximized cost for them.
There. I optimized it for you.
If you can shave off a factor n in O(n^3) then O-B-V-I-O-U-S-L-Y it will change the world. If you don't see the obviousness in this, then why are you working with computers?
Before you hate on me, did you even google "quantum computer"? Did you read the introduction section of the Wikipedia article?
Disclaimer: I dont know
The system programmers of 1983 were used to low-level programming, and most of them had probably written code in assembler. Web programmers seldom have that deep understanding of the computer.
At least, this is true from my own personal experience.
If I just make sure that incomming packets that are destined for the VPN LAN are dropped, this attack does not work?
Of course there are such rules in our firewalls??
Is everyone walking around without any firewall filtering nowadays? How is this a bug? Maybe I am just stupid. Did I miss something?
. . .
The corporate world is so facepalm sometimes
yggdrasil is a "greynet". End-to-end encrypted, self-organizing via DHT, but no onion/garlic routing. Has interop capabilities with both Tor and I2P though, and some yggdrasil nodes are I2P- or Tor-only. A world-tree with roots (tunnels) going in all the spheres of existence (nets)
Hands out IPv6 addresses to its users. These addresses are generated automatically from the signature of your public key, so essentially impossible to spoof, and automatic authentication, plus end-to-end encryption. As if IPsec was pervasive and completely transparent