• icegladiator@lemy.lol
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    1
    ·
    24 hours ago

    That moment when you decide to use i2p because its more sustainable for every user to be a node just for your server’s location to get leaked in a vulnerability. This is why most deep web migration to i2p ended

      • icegladiator@lemy.lol
        link
        fedilink
        English
        arrow-up
        1
        ·
        15 hours ago

        i2p before 2.3.0 (Java) allows de-anonymizing the public IPv4 and IPv6 addresses of i2p hidden services (aka eepsites) via a correlation attack across the IPv4 and IPv6 addresses that occurs when a tunneled, replayed message has a behavior discrepancy (it may be dropped, or may result in a Wrong Destination response). https://nvd.nist.gov/vuln/detail/CVE-2023-36325

      • xthexder@l.sw0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        17 hours ago

        I don’t really have a link, but you might be able to find something talking about game server protocols. Outside of LAN, usually you’re either connecting to a central server, or a peer relay. With a relay server it’s just a proxy between you and the other players to hide your IP from others.
        There’s plenty of cases in games that didn’t do this where malicious actors could find the IPs of the people they’re playing with and DDoS them to give themselves an advantage. Knowing someone’s IP will also probably tell you extra info about them like what city they’re in, and open them up for further hacking.

    • floofloof@lemmy.ca
      link
      fedilink
      English
      arrow-up
      1
      ·
      17 hours ago

      I must have missed that. When did that happen? I used i2p a long time ago and it seemed very promising. I imagine it has got better since.