This essay takes a look at a selection of network anonymity systems including VPNs, Tor, Freenet and I2P. The different systems are explained and then compared and contrasted with each other. A number of issues are considered for each system including ease of use, popularity, strength of anonymity provided, and potential attacks on the system.
a4e13aeaa32d0f23f46e8a5422c6a62f47a566f7de1f2f87f6b1a2306e58ba82