1.7 A Comparative Anatomy of Hidden Networks (F2F, I2P, Tor, Yggdrasil, Nym, Lokinet)

1.7 A Comparative Anatomy of Hidden Networks (F2F, I2P, Tor, Yggdrasil, Nym, Lokinet)

Hidden networks — commonly called darknets — differ significantly in architecture, routing logic, threat models, and intended use cases.
While most people only know Tor, the darknet ecosystem is an entire family of anonymity-preserving overlay networks, each engineered to solve a different type of privacy problem.

This chapter examines six major systems:

  • F2F Networks (Friend-to-Friend)

  • I2P (Invisible Internet Project)

  • Tor (The Onion Router)

  • Yggdrasil

  • Nym Mixnet

  • Lokinet

This comparative anatomy highlights their design philosophies, routing mechanisms, security assumptions, and sociotechnical roles.


A. F2F Networks (Friend-to-Friend)

F2F networks are a category of peer-to-peer networks where only trusted peers connect directly.
Examples include: Retroshare, GNUnet in F2F mode, and earlier P2P prototypes.

Key Architectural Features

  1. Private Peer Connections
    Users connect only to known contacts (friends).
    This reduces exposure but limits scalability.

  2. Decentralization
    No central servers.
    Routing is done through trusted relationships.

  3. High Resistance to Infiltration
    Hard for adversaries to enter without social engineering.

  4. Low Anonymity Set
    The network size is limited to the number of trusted peers.

Use Case

Ideal for:

  • activist groups

  • private communities

  • censorship-resistant messaging

Not suited for large-scale anonymous publishing.


B. I2P — Invisible Internet Project

I2P is a fully internal darknet designed so that all traffic stays inside the network.
Its architecture uses garlic routing, an evolved form of onion routing where multiple messages are bundled together to make traffic analysis harder.

Key Architectural Features

  1. Unidirectional Tunnels
    Separate tunnels for inbound and outbound traffic.
    This reduces certain correlation attacks.

  2. Garlic Routing
    Multiple messages packed into a “garlic bulb.”
    Harder to isolate individual packets.

  3. Decentralized Routing
    No centralized directory authorities (unlike Tor).
    Routing uses a distributed netDB (network database).

  4. Internal Services (Eepsites)
    I2P hosts its own websites ending in .i2p.

Use Case

  • anonymous peer-to-peer applications

  • chat, file-sharing

  • decentralized communities

  • internal anonymous services rather than clearnet access


C. Tor — The Onion Router

Tor is the most widely known anonymity network, using onion routing with multi-layer encryption through volunteer nodes.

Key Architectural Features

  1. Onion Routing
    Data is wrapped in multiple encryption layers.
    Each relay peels one layer and sends the packet forward.

  2. Directory Authorities
    Centralized but highly audited servers that maintain the relay list.
    Improve network reliability and consistency.

  3. Hidden Services (.onion)
    Tor allows both client and server anonymity.

  4. Large Anonymity Set
    Thousands of relays and millions of users.

Use Case

  • anonymity for browsing

  • hosting hidden services

  • journalism and secure drops

  • anti-censorship

Tor sacrifices some performance for usability and scale.


D. Yggdrasil — Encrypted Global Mesh Network

Yggdrasil is a newer experimental network that creates an end-to-end encrypted IPv6-only global mesh using a Distributed Hash Table (DHT) for routing.

Key Architectural Features

  1. End-to-End Encryption by Default
    Every node has a cryptographic public key as its address.

  2. Global IPv6 Network
    Each node receives an IPv6 address derived from its public key.

  3. DHT-Based Routing
    Ensures efficient path finding and global connectivity.

  4. No Onion Routing
    Yggdrasil is focused on secure routing, not strong anonymity.

Use Case

  • decentralized infrastructure

  • experimental networking

  • global encrypted IPv6 overlay

Good for privacy, but not designed as a strong anonymity network.


E. Nym Mixnet — Next-Generation Metadata-Resistant Network

Nym revives and modernizes Chaumian mix networks, designed to eliminate metadata leakage — something onion routing struggles with under global adversaries.

Key Architectural Features

  1. Mix Nodes
    Nodes batch, delay, and shuffle packets to break correlation.

  2. Full Metadata Protection
    Prevents timing analysis, volume analysis, and global attacker correlation.

  3. Sphinx Packet Format
    A modern, efficient, compact format for mix networks.

  4. Incentivized Participation
    Nodes can be rewarded through blockchain mechanisms.

Use Case

  • high-security communications

  • whistleblowing

  • resistant to nation-state surveillance

  • privacy for messaging and credentials

Nym is considered stronger than Tor in metadata protection, but slower because of batching delays.


F. Lokinet (Oxen Network)

Lokinet is a privacy network based on the LLARP (Low Latency Anonymous Routing Protocol), aiming for faster anonymity than Tor.

Key Architectural Features

  1. SNODEs (Service Nodes)
    Staked nodes that provide routing and anonymity.

  2. High-speed Onion Routing Variant
    Lower latency compared to Tor.

  3. Exit Functionality
    Allows anonymous access to the clearnet.

  4. Onion Services Equivalent
    Called “Lokinet SNApps.”

Use Case

  • real-time online applications needing privacy

  • voice/video communication

  • faster anonymous internet routing

Lokinet focuses on balancing anonymity with performance.


G. Comparative Architecture Analysis (Point-Wise)

1. Routing Approach

  • Tor: onion routing

  • I2P: garlic routing

  • Nym: mixnet w/ batching

  • Yggdrasil: DHT-based encrypted mesh

  • Lokinet: LLARP (low-latency onion routing)

  • F2F: direct trusted P2P connections

2. Anonymity Level

Highest: Nym
High: Tor, I2P
Moderate: Lokinet
Low/Variable: Yggdrasil
Social-layer anonymity: F2F networks

3. Performance

Fastest: Yggdrasil, Lokinet
Moderate: Tor
Variable: I2P
Slowest: Nym (because mixing requires delays)

4. Use Case Focus

  • Tor: browser anonymity, hidden websites

  • I2P: internal darknet communities

  • Nym: metadata-resistant communications

  • Yggdrasil: decentralized encrypted networking

  • Lokinet: real-time anonymous routing

  • F2F: private communities


H. Why Multiple Hidden Networks Exist

Each system solves a different privacy problem:

  • Tor optimizes scale and usability

  • Nym optimizes metadata protection

  • I2P optimizes internal darknet resilience

  • Lokinet optimizes speed

  • Yggdrasil optimizes global encrypted addressing

  • F2F optimizes trust boundaries

No single anonymity network can solve all privacy challenges simultaneously — hence the ecosystem diversity.

a73f72b43fefc9e5668a69591e13c487.png

df442515cb210a40a3f9781419eea3fb.png

8b5a8ef655f38f8b41b7e714943e07f9.png

d34c7b17e05c3791ad2ce318576427cf.png

b827395e51443746ced9836917eacabd.png

 

CategoryF2F NetworksI2PTorYggdrasilNym MixnetLokinet
Primary PhilosophyTrust-based private overlayInternal anonymous ecosystemLarge-scale anonymity & censorship resistanceEncrypted global mesh networkingMetadata-resistant communicationLow-latency anonymous routing
Routing MethodDirect friend-to-friend connectionsGarlic routing + unidirectional tunnelsOnion routing (three-hop circuits)DHT-based encrypted routingChaumian mixnet (batching & shuffling)LLARP (low-latency onion variant)
Network StructureFully decentralized, small trust circlesFully decentralized, distributed netDBSemi-centralized (directory authorities) + decentralized relaysDecentralized global IPv6 overlayLayered mixnet with gateways & validatorsDecentralized SNODE network
Addressing SystemPeer public keys.i2p eepsites.onion addressesPublic-key derived IPv6 addressesNo sites; message routing only.loki / SNApp addressing
Metadata Protection LevelLow to moderateModerate to highHigh (but vulnerable to global traffic correlation)Low (not designed for anonymity)Very high (resistant to global adversaries)Moderate
Anonymity Set SizeSmall (limited to social circles)MediumVery large (millions of users)Small (depends on network adoption)Large, grows with mixnet participantsMedium
Clearnet AccessNot designed for itNot intended (internal darknet)Supported via exitsNot designed for itNot designed for browsingYes, via exits
Hidden Services SupportYes, but limitedYes (eepsites)Yes (.onion services)Not nativeNot for websites; for communicationYes (SNApps)
PerformanceModerateModerate to variableModerateFastSlow (due to mixing)Fast
Latency ProfileLow within small networksMediumMedium to highLowHigh latencyLow
ScalabilityLimitedGoodVery goodGoodGoodGood
Attack ResistanceStrong against infiltration, weak against global observersGood against local adversariesGood but challenged by global attackersLimited anonymity resistanceStrongest of all for metadata protectionGood vs moderate adversaries
Core StrengthTight social trust + decentralizationInternal anonymous ecosystem with flexible routingMature, widely supported anonymity networkEasy encrypted routing + IPv6 topologyStrongest metadata protection availableReal-time anonymous communication
Core WeaknessSmall anonymity setSlower and less user-friendlyVulnerable to timing/traffic correlationLimited anonymity goalsHigh latencySmaller ecosystem than Tor/I2P
Primary Use CasesActivist groups, private messagingAnonymous communities, P2P appsCensorship resistance, browsing, journalismExperimental decentralized networkingWhistleblowing, privacy-critical messagingLow-latency anonymous apps
Example ProjectsRetroshare, GNUnet F2F modeI2P routerTor Browser, Onion servicesYggdrasil meshNym networkLokinet / Oxen ecosystem
NetworkBest FeatureWeakest PointTypical User
F2FStrong trust boundariesVery small anonymity setPrivate activist groups
I2PInternal darknet structureLess mainstream supportPrivate communities & P2P users
TorLarge anonymity set & hidden servicesSusceptible to global correlationJournalists, citizens in censored regions
YggdrasilFast encrypted mesh routingNot built for anonymityExperimental networking enthusiasts
NymHighest metadata protectionHigh latencyHigh-security users, whistleblowers
LokinetLow-latency anonymitySmaller network than TorReal-time communication users

 

 


docs