Skip to content

2.4 Comparative Latency Studies Across Darknets

Latency — the delay between sending and receiving data — is one of the most defining characteristics of any anonymity network.
Every darknet (Tor, I2P, Freenet, GNUnet, Yggdrasil, Nym) is designed for a different privacy model, and therefore, latency is not a “bug” but a design decision.

This chapter examines how architectural choices affect latency, bandwidth, routing delay, and real-world responsiveness.


Latency affects:

  • user experience

  • bandwidth usage

  • reliability of connections

  • feasibility of real-time applications

  • anonymity strength

In anonymity systems, lower latency usually means weaker anonymity, while higher latency often correlates with stronger anonymity (especially against global adversaries).

This is known as the latency–anonymity tradeoff.


B. Low-Latency vs High-Latency Anonymous Networks

Section titled “B. Low-Latency vs High-Latency Anonymous Networks”
TypePurposeExamplesAverage Latency
Low-Latency NetworksReal-time usageTor, Lokinet, Yggdrasil50 ms – 600 ms
Medium-Latency NetworksPeer-to-peer, internal darknetI2P, GNUnet200 ms – several seconds
High-Latency NetworksStrong metadata resistanceNym, Loopix, mixnetsSeveral seconds to minutes

No darknet is optimized for all three: speed, security, and anonymity.


Latency differences are caused by:

  1. Routing architecture (onion, garlic, DHT, mixnet)

  2. Number of hops in each request

  3. Cryptographic operations required per message

  4. Node selection and trust model

  5. Network congestion

  6. Geographical distribution of nodes

  7. Design priorities (speed vs anonymity vs decentralization)

Let’s analyze each network individually.


D. Tor Latency Characteristics (Low-Latency Onion Routing)

Section titled “D. Tor Latency Characteristics (Low-Latency Onion Routing)”

Tor uses three-hop circuits with layered encryption.

  • Typical: 100–600 ms

  • Higher under congestion

  • Lower than I2P due to centralized directory authorities enabling optimized routing

  1. Relays are volunteer-based and unpredictable in performance.

  2. Multiple encryption layers add processing time.

  3. Circuits rotate every ~10 minutes, adding overhead.

  4. Path length fixed at 3 hops, balancing anonymity and latency.

Empirical studies show Tor is suitable for:

  • browsing

  • messaging

  • moderate-speed downloads

Not ideal for:

  • VoIP

  • video streaming

  • high-throughput applications

Reference: Johnson et al., 2013; Dingledine et al., 2004.


E. I2P Latency Characteristics (Unidirectional Tunnels + Garlic Routing)

Section titled “E. I2P Latency Characteristics (Unidirectional Tunnels + Garlic Routing)”

I2P routes data through separate inbound and outbound tunnels, increasing routing complexity.

  • Typically: 150 ms – several seconds

  • Higher than Tor in many experiments

  • Highly dependent on tunnel length and peer performance

  1. Two independent tunnels increase overhead.

  2. DHT-based router selection introduces randomness.

  3. Garlic routing bundles multiple messages, adding processing time.

  4. Internal peer-to-peer design prioritizes anonymity over speed.

I2P is optimized for:

  • internal darknet websites

  • P2P file sharing

  • anonymous chat

Reference: Zantout & Haraty, 2011; I2P Technical Documentation.


F. Freenet Latency Characteristics (Distributed Data Store)

Section titled “F. Freenet Latency Characteristics (Distributed Data Store)”

Freenet is not designed for interactive browsing.
It is effectively a distributed cache retrieval system with probabilistic routing.

  • Can range from several seconds to several minutes

  • Depends heavily on:

    • network size

    • content popularity

    • data replication proximity

  1. No direct path to content — routing is probabilistic.

  2. Data is split into encrypted chunks across the network.

  3. Requests may traverse many hops before completion.

Ideal for:

  • censorship-resistant publishing

  • long-term archival storage

Not designed for real-time use.

Reference: Clarke et al., 2000.


G. GNUnet Latency Characteristics (Peer Group Cryptography & Transport Plugins)

Section titled “G. GNUnet Latency Characteristics (Peer Group Cryptography & Transport Plugins)”

GNUnet’s routing protocols vary depending on which subsystem is used.

  • Medium to high latency

  • Varies greatly with transport plugin (TCP, UDP, Bluetooth)

  1. Heavy cryptographic authentication between peer groups.

  2. Flexible routing layers introduce additional overhead.

  3. Emphasis on distributed trust over speed.

GNUnet is optimized for:

  • censorship-resistant naming (GNS)

  • distributed identity

  • private group communications

Reference: Grothoff, 2017; GNUnet Architecture Documentation.


H. Yggdrasil Latency Characteristics (Encrypted IPv6 Mesh)

Section titled “H. Yggdrasil Latency Characteristics (Encrypted IPv6 Mesh)”

Yggdrasil provides encrypted routing but not anonymity.
It aims for fast, stable global mesh networking.

  • Low latency: 20–100 ms depending on proximity

  • Comparable to VPN tunneling

  • Faster than Tor and I2P in most cases

  1. Efficient DHT-based routing.

  2. Minimal cryptographic overhead compared to onion routing.

  3. Emphasis on secure connectivity, not anonymity.

Ideal for:

  • decentralized applications

  • peer mesh networking

Reference: Yggdrasil Whitepaper.


I. Nym Latency Characteristics (High-Latency Mixnet)

Section titled “I. Nym Latency Characteristics (High-Latency Mixnet)”

Nym is designed for maximum metadata resistance, not speed.

  • Several seconds to minutes

  • Controlled delays intentionally disrupt timing correlations

Mixnets deliberately add:

  • batching

  • shuffling

  • timing obfuscation

  • multi-hop message mixing

Ideal for:

  • whistleblowing

  • private messaging

  • metadata-resistant communication

Not suitable for:

  • web browsing

  • real-time activities

Reference: Kwon et al., 2017 (Loopix design); Nym Whitepaper.


NetworkLatency LevelRouting TypeNotes
YggdrasilLowDHT MeshFastest, not anonymity-focused
LokinetLow to MediumLLARPDesigned for real-time anonymous apps
TorMediumOnion RoutingBalanced anonymity vs speed
I2PMedium to HighGarlic RoutingHigher latency due to dual tunnels
GNUnetMedium to HighPeer-group routingFlexible but heavy cryptography
FreenetHighKey-based data retrievalStorage system, not real-time
NymVery HighMixnetStrongest metadata protection

 


Each network optimizes for a different goal:

  • Speed: Yggdrasil, Lokinet

  • Balanced anonymity: Tor

  • Decentralized anonymity: I2P

  • Storage-based censorship resistance: Freenet

  • Trust-based anonymity: GNUnet

  • Metadata resistance: Nym

Latency is therefore a direct reflection of a network’s threat model and design philosophy, not a defect.