wait, so this would route my traffic through others’ internet connections and theirs through mine? seems like a great way to get implicated for actually illegal activity, like, say, other people running I2P to download and/or upload certain types of porn.
Man, why is everyone like this? Please read the documentation, the traffic is encrypted and metadata cannot identify you. Unless the NSA has an active hack for I2P lying around, NO-ONE IN THIS WORLD can find out what chunks of traffic just went flying by your internet connection
sure, but I2P’s end-to-end encryption is for connecting to I2P addresses, not the general internet. I’m unclear on whether every node serves as an anonymized connection to the internet, though.
EDIT: read a little deeper! so no, not every computer connected to I2P is an internet-connected node, but, due to the limited number of internet-connected nodes, I2P does not offer the same level of anonymity that a VPN does, and may struggle from bandwidth issues.
the whole purpose of a VPN is to anonymize internet traffic, so they have many servers that send traffic out to the internet, which improves both anonymity and bandwidth. I2P is more akin to Tor, with anonymizing internet traffic as a bit of an afterthought, and the limited number of internet-connecting nodes makes users’ traffic more trackable.
What you’re talking about is supposed anonymity in obfuscation, and that has been proven to not work.
Also, most VPN companies keep logs and can be subpoenaed. Not all, but most. I2P is meant to anonymize your traffic, so I do not see the point of your statement
What you’re talking about is supposed anonymity in obfuscation, and that has been proven to not work.
if it’s been proven not to work, then neither I2P nor VPN is worth using, no?
most VPN companies keep logs and can be subpoenaed.
well, sure, but that’s why anybody looking into a VPN is generally advised to use specific, known-good VPN providers who don’t keep logs and who, preferably, aren’t headquartered in a country with strict IP law.
it’s all encrypted, and a darknet, so unless you’re routing through exit nodes, or you host an exit node, that information isn’t publicly accessible.
the other problem here is the “illegal contents” problem, if UPS accidentally ships a human head in the mail, is that the fault of the UPS? If someone mails a bomb to someone else, is that also the fault of UPS?
Ultimately, there is little to no reasoning as to why you should be capable of getting into trouble, unless you’re storing it, and it’s a very very strict law. But it’s a router, so it shouldn’t be storing anything.
The i2p outproxy is simply a user-specified proxy that i2p uses when you try to fetch someting outside the i2p network. I2p does not implement that proxy itself, therefore it is not part of i2p / it can’t be called an i2p exit node.
It seems trivial for the US government to tie data into TOR to data out. If you’re hiding things that government is willing to spend effort seeking, it’s not safe.
im not sure to which scale this is true, but TOR specifically is highly centralized, and by design I2P is extremely decentralized, with most nodes running network routing of other nodes. Not that it’s impossible to do, it’s just a lot harder, and not nearly as valuable.
A lot of the ways in which people are got over shit like TOR is just skill issuing. Don’t run a drug empire on the darknet and you’ll probably be fine. If you do run a drug empire on the darknet, you better be damn fucking good at opsec, and pretty fucking good at laundering money. And even then you’ll probably still end up fucking it up.
Yeah, if you don’t mind it possibly taking a week to download something… Really like the idea, but in practice it’s very slow for something like that, unless you got a lot of seeders for something maybe.
I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P
watched the mental outlaw video i see
wait, so this would route my traffic through others’ internet connections and theirs through mine? seems like a great way to get implicated for actually illegal activity, like, say, other people running I2P to download and/or upload certain types of porn.
Man, why is everyone like this? Please read the documentation, the traffic is encrypted and metadata cannot identify you. Unless the NSA has an active hack for I2P lying around, NO-ONE IN THIS WORLD can find out what chunks of traffic just went flying by your internet connection
sure, but I2P’s end-to-end encryption is for connecting to I2P addresses, not the general internet. I’m unclear on whether every node serves as an anonymized connection to the internet, though.
EDIT: read a little deeper! so no, not every computer connected to I2P is an internet-connected node, but, due to the limited number of internet-connected nodes, I2P does not offer the same level of anonymity that a VPN does, and may struggle from bandwidth issues.
I can understand the argument against bandwidth, but how do you conclude that it is not anonymous enough? Even against a VPN?
the whole purpose of a VPN is to anonymize internet traffic, so they have many servers that send traffic out to the internet, which improves both anonymity and bandwidth. I2P is more akin to Tor, with anonymizing internet traffic as a bit of an afterthought, and the limited number of internet-connecting nodes makes users’ traffic more trackable.
What you’re talking about is supposed anonymity in obfuscation, and that has been proven to not work.
Also, most VPN companies keep logs and can be subpoenaed. Not all, but most. I2P is meant to anonymize your traffic, so I do not see the point of your statement
if it’s been proven not to work, then neither I2P nor VPN is worth using, no?
well, sure, but that’s why anybody looking into a VPN is generally advised to use specific, known-good VPN providers who don’t keep logs and who, preferably, aren’t headquartered in a country with strict IP law.
it’s all encrypted, and a darknet, so unless you’re routing through exit nodes, or you host an exit node, that information isn’t publicly accessible.
the other problem here is the “illegal contents” problem, if UPS accidentally ships a human head in the mail, is that the fault of the UPS? If someone mails a bomb to someone else, is that also the fault of UPS?
Ultimately, there is little to no reasoning as to why you should be capable of getting into trouble, unless you’re storing it, and it’s a very very strict law. But it’s a router, so it shouldn’t be storing anything.
There are no exit nodes on i2p.
there can be clear net proxies iirc, which are essentially exit nodes, but they aren’t recommended for fairly obvious reasons.
It’s called an outproxy
The i2p outproxy is simply a user-specified proxy that i2p uses when you try to fetch someting outside the i2p network. I2p does not implement that proxy itself, therefore it is not part of i2p / it can’t be called an i2p exit node.
It seems trivial for the US government to tie data into TOR to data out. If you’re hiding things that government is willing to spend effort seeking, it’s not safe.
im not sure to which scale this is true, but TOR specifically is highly centralized, and by design I2P is extremely decentralized, with most nodes running network routing of other nodes. Not that it’s impossible to do, it’s just a lot harder, and not nearly as valuable.
A lot of the ways in which people are got over shit like TOR is just skill issuing. Don’t run a drug empire on the darknet and you’ll probably be fine. If you do run a drug empire on the darknet, you better be damn fucking good at opsec, and pretty fucking good at laundering money. And even then you’ll probably still end up fucking it up.
Yeah, if you don’t mind it possibly taking a week to download something… Really like the idea, but in practice it’s very slow for something like that, unless you got a lot of seeders for something maybe.
has it gotten any better since 100 years ago or whenever I was a kid?