FINDING · DETECTION
I2P payload entropy was measured at close to 8 bits per byte across sampled packets (Figure 9), confirming that payload content is cryptographically indistinguishable from random noise and provides no usable signal for classification. All experimental variants using raw payload alone achieved poor and high-variance accuracy (72.5–76.5%), while excluding payload improved accuracy to 99.5% in lab conditions.
From 2026-rohrer-convolutional-neural-networks-deanonymisation-i2p — Convolutional-Neural-Networks for Deanonymisation of I2P Traffic · §IV-A / §V Discussions · 2026 · arXiv preprint
Implications
- Full payload encryption is a necessary but insufficient defense — censors and classifiers pivot to metadata when payload is opaque; protocols must also address packet-size and timing fingerprints.
- The near-8-bit payload entropy that makes I2P resistant to payload inspection is the same property that triggers 'fully-encrypted protocol' detectors; protocols should couple encryption with traffic shaping to avoid this detection vector.
Tags
Extracted by claude-sonnet-4-6 — review before relying.