• icegladiator@lemy.lol
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      1
      ·
      24 hours ago

      That moment when you decide to use i2p because its more sustainable for every user to be a node just for your server’s location to get leaked in a vulnerability. This is why most deep web migration to i2p ended

        • icegladiator@lemy.lol
          link
          fedilink
          English
          arrow-up
          1
          ·
          16 hours ago

          i2p before 2.3.0 (Java) allows de-anonymizing the public IPv4 and IPv6 addresses of i2p hidden services (aka eepsites) via a correlation attack across the IPv4 and IPv6 addresses that occurs when a tunneled, replayed message has a behavior discrepancy (it may be dropped, or may result in a Wrong Destination response). https://nvd.nist.gov/vuln/detail/CVE-2023-36325

        • xthexder@l.sw0.com
          link
          fedilink
          English
          arrow-up
          1
          ·
          17 hours ago

          I don’t really have a link, but you might be able to find something talking about game server protocols. Outside of LAN, usually you’re either connecting to a central server, or a peer relay. With a relay server it’s just a proxy between you and the other players to hide your IP from others.
          There’s plenty of cases in games that didn’t do this where malicious actors could find the IPs of the people they’re playing with and DDoS them to give themselves an advantage. Knowing someone’s IP will also probably tell you extra info about them like what city they’re in, and open them up for further hacking.

      • floofloof@lemmy.ca
        link
        fedilink
        English
        arrow-up
        1
        ·
        17 hours ago

        I must have missed that. When did that happen? I used i2p a long time ago and it seemed very promising. I imagine it has got better since.