Research results as video: I2P, De-Anonymisation and DIVA

The research results on “De-anonymisation of I2P network participants” were published at MoneroKon2022 in Lisbon.

The researchers, Brian Boss and Marco Purtschert, worked together with DIVA.EXCHANGE and the Lucerne University of Applied Sciences and Arts on the design of attacks on the I2P network. Specifically, this involved the de-anonymisation of participants in the I2P network. The research results of this important study are now being made available to everyone as a video.

Attacking the I2P network

All users of the free banking technology “DIVA” trust in the protection of their privacy. That is why DIVA relies on the “privacy by design” network I2P. DIVA helps to further develop the network and provides, for example, a popular library for the use of I2P by other programmes.

Simply put: I2P is “its own network on the internet”. I2P protects – according to its own statements – the privacy of the network participants. All traffic is encrypted (that’s easy, anyone can do it – also has little to do with “privacy”), the senders and receivers of messages do not know or trust each other (somewhat more complex) and the receivers and senders of messages cannot be de-anonymised by third parties (high art and defines privacy).

An attack on the I2P network is an attack on the privacy of the users.

State-of-the-art technology and science

So this research was actually about de-anonymisation by third parties. Addressing this issue is significant from a practical point of view and from a scientific perspective. From a practical perspective, because DIVA.EXCHANGE, as a fully private and distributed trading place for digital assets, wants to provide its users with the latest and most reliable state of the art and science. From a scientific perspective, because research on I2P has been making significant progress for several years and an exciting data space is emerging. I2P has become established for serious applications as well as gaining relevance in research areas such as “cyber security” or “forensics”.

The video not only shows the current status of DIVA.EXCHANGE with regard to banking technology for digital assets (e.g. cryptocurrencies such as Monero, Bitcoin or Ethereum), it also shows how a concrete attack on the I2P network can be designed for the purpose of de-anonymising participants.

Developing “free banking technology for all” requires continuous research and development. DIVA.EXCHANGE, as an association, is making these efforts and developing open systems, software and processes for all. This means that all research and development work is freely accessible to all.

Watch the video now

The research results were presented at MoneroKon2022 in Lisbon and are now available as a video for everyone.

Video MoneroKon I2P DIVA.EXCHANGE

Where can one ask questions?

It is best to ask all questions publicly in the Telegram chat of DIVA.EXCHANGE – German or English. Also suitable is Twitter, https://twitter.com/@DigitalValueX or Mastodon, https://social.diva.exchange/@social.

FURTHER LINKS

Video: https://odysee.com/@diva.exchange:d/monerokon2022:0

Public chat of the DIVA.EXCHANGE community, German and English: https://t.me/diva_exchange_chat_de

Privacy, simply explained: https://www.diva.exchange/en/privacy/privacy-simply-explained/

Instructions for beginners in I2P, English: https://codeberg.org/diva.exchange/i2p

Video channel: https://lbry.tv/@diva.exchange:d

Introduction in I2P, https://en.wikipedia.org/wiki/I2P

DIVA.EXCHANGE Testnet: https://testnet.diva.exchange

DIVA.EXCHANGE on Codeberg: https://codeberg.org/diva.exchange