Someone please post a link to this post over in the Monero thread so they can come over here to address it. I don't want to shit on their thread. I am not criticizing Monero per se. I am technically criticizing I2P when deployed against a high-powered adversary such as the NSA.
I am disappointed in whom ever made this decision for marketing reasons (apparently) without sufficient engineering investigation.I2P (which is relied on by Monero to insure your anonymity) has updated
their detailed summary of potential attacks. That looks really bad (as I had expected). I wouldn't trust for that for obfuscating who sent a message to whom in the face of a powerful adversary and neither do they...
How do you plan to stop IP leakage with I2p? (A decentralized IP ring signature would be nice--seriously though, would a market solution built on top of I2p help unlink all the transactions? Or does the whole structure need to be overhauled/fine-tuned/scrapped?)
I do take issue with the bolded part as there is TOR (even worse) and I2p, so it is like choosing between Hillary Clinton and Donald Trump (though, who knows how to order their awfullness)--AFAIK the Monero Devs are working to improve I2p function with Monero not just integrating the two--so without knowing how they are or are not planning to improve the IP functionality, how are you sure if the criticism isn't already addressed....
I would like to read their response and how you plan to improve the functionality as this is a huge opportunity to improve financial privacy.