Technische Universitat Ilmenau
I2P is one of the most widely used anonymizing peer-to-peer networks on the internet today. Like tor, it uses onion routing to build tunnels between peers as the basis for providing anonymous communication channels. Unlike tor, I2P integrates a range of anonymously hosted services directly with the platform. This paper presents a new attack on the I2P peer-to-peer network, with the goal of determining the identity of peers that are anonymously hosting HTTP services (Eepsite) in the network. Key design choices made by I2P developers, in particular performance-based peer selection, enable a sophisticated adversary with modest resources to break key security assumptions.