eleitl@lemmy.world to The Invisible Internet Project@lemmy.worldEnglish · 1 year agoYggdrasil Networkyggdrasil-network.github.ioexternal-linkmessage-square2fedilinkarrow-up12arrow-down10cross-posted to: lemmy_support@lemmy.mlselfhosted@lemmy.worldipv6@lemmy.worldgolang@lemmy.ml
arrow-up12arrow-down1external-linkYggdrasil Networkyggdrasil-network.github.ioeleitl@lemmy.world to The Invisible Internet Project@lemmy.worldEnglish · 1 year agomessage-square2fedilinkcross-posted to: lemmy_support@lemmy.mlselfhosted@lemmy.worldipv6@lemmy.worldgolang@lemmy.ml
minus-squareCAVOK@lemmy.worldMlinkfedilinkEnglisharrow-up0·1 year agoWhat’s the relation to, or comparison to i2p? Can you expand a bit on what it is, or what it does better or different than i2p?
minus-squareeleitl@lemmy.worldOPlinkfedilinkEnglisharrow-up1·1 year agoIt’s not an anonymity network, just autorouted overlay (but can do L2 eventually) IPv6-only user-side encrypted decentralized network with explicit peering. You can run i2p over it as well as anything else as long it can do IPv6-only.
What’s the relation to, or comparison to i2p? Can you expand a bit on what it is, or what it does better or different than i2p?
It’s not an anonymity network, just autorouted overlay (but can do L2 eventually) IPv6-only user-side encrypted decentralized network with explicit peering. You can run i2p over it as well as anything else as long it can do IPv6-only.