FINDING · DETECTION

I2P obfuscates payload content to prevent protocol identification, but flow analysis can still fingerprint I2P traffic because the first four handshake messages between I2P routers have fixed lengths of exactly 288, 304, 448, and 48 bytes. The I2P team acknowledged this and was developing an authenticated key agreement protocol to resist automated identification.

From 2018-hoang-empiricalAn Empirical Study of the I2P Anonymity Network and its Censorship Resistance · §2 · 2018 · Internet Measurement Conference

Implications

Tags

censors
generic
techniques
dpitraffic-shape
defenses
randomization

Extracted by claude-sonnet-4-6 — review before relying.