Obscuring P2P Nodes with Dandelion
Posted27 days agoActive21 days ago
johndcook.comTech Discussionstory
informativeneutral
Debate
20/100
P2P NetworkingData_securityDandelion Protocol
Key topics
P2P Networking
Data_security
Dandelion Protocol
Discussion Activity
Light discussionFirst comment
5d
Peak period
4
108-120h
Avg / period
2.3
Key moments
- 01Story posted
Dec 8, 2025 at 11:27 AM EST
27 days ago
Step 01 - 02First comment
Dec 13, 2025 at 7:49 AM EST
5d after posting
Step 02 - 03Peak activity
4 comments in 108-120h
Hottest window of the conversation
Step 03 - 04Latest activity
Dec 14, 2025 at 11:03 AM EST
21 days ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
ID: 46194245Type: storyLast synced: 12/13/2025, 6:40:46 PM
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
My understanding is that TOR also provides the latter - as that is specifically the purpose of the "onion" routing: https://en.wikipedia.org/wiki/Onion_routing
I had the impression that onion services are exactly that: protection inside the P2P network.
> A natural question is how this differs from something like Tor. In a nutshell, Tor offers identity protection before you enter a P2P network, and Dandelion offers identity protection inside the P2P network.
Also either the author doesn't know anything about Tor or he phrased that sentence poorly.