1. It doesn’t make you anonymous. Torrent protocol wasn’t designed with anonymity in mind and there are a million ways you’re going to leak your actual IP address.
  2. Tor is a TCP only network.
  3. While this doesn’t give you the anonymity you wanted, it will hurt the network for other users.
You are viewing a single thread.
View all comments View context
22 points
*

It is a different anonymity network, which works differently in many aspects.

I2P and Tor comparison: https://geti2p.net/en/comparison/tor
I2P on Bittorrent (mostly a client dev guide, but has some interesting info): https://geti2p.net/en/docs/applications/bittorrent

Currently BiglyBt supports I2P and it has been that way for quite some time.
If you use qBittorrent, I2P support will come in version 4.6. you can try it out now with the published release candidate version. Probably other clients are working on it too as the support is coming from the libtorrent programming library, which is used by other clients too.

Right now, I2P is quite slow in my experience, in terms of loading I2P websites. I hope that it’s just a misconfiguration on my part, or that these specific sites I tried are just overloaded.

permalink
report
parent
reply
-1 points

Near as I can tell:

Tor is about privacy (and is prone to being compromised but…). So long as the exit nodes are in “friendly” countries and are run by trustworthy individuals (…), you are “safe”. And that is why it is popular among journalists. The downside being that a lot of heinous shit is done on Tor and those exit nodes are potentially liable for them.

I2P is about avoiding censorship. Everyone is an exit node and cops kicking down doors doesn’t significantly hurt the network.

But… I would very much NOT use that for torrenting. Because the endpoints can still be detected and recorded. And “I wasn’t downloading that Tay Swizzle concert, I was just letting potentially thousands of other people use my computer to download it… Why did you suddenly start laughing and talking about The Pirate Bay?”.

And that also ignores the “darker” parts of the dark web. Where, rather than getting a letter from the MPAA you get a visit from Chris Hansen.

permalink
report
parent
reply
13 points

On i2p everyone is a node but not everyone is an outproxy to the clearnet, you have to enable it manually.

permalink
report
parent
reply
10 points

It is not true that every node is an exit node in I2P. The I2P protocol does not officially have exit nodes—all I2P communication terminates at some node within the I2P network, encrypted end-to-end. It is possible to run a local proxy server and make it accessible to other users as an I2P service, creating an “exit node” of sorts, but this is something that must be set up deliberately; it’s not the default or recommended configuration. Users would need to select a specific I2P proxy service (exit node) to forward non-I2P traffic through and configure their browser (or other network-based programs) to use it.

permalink
report
parent
reply
-4 points

Maybe I am missing something but that just feels like you are arguing semantics.

Traffic exits the sub-WAN from basically any of the computers/nodes in it. So it might not be a Tor Exit Node ™ but it still has all the dangers of it.

permalink
report
parent
reply
2 points

I2P doesn’t really have exit nodes. You can only browse within the I2P network.

permalink
report
parent
reply
1 point

Out proxies are a thing

permalink
report
parent
reply

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

!piracy@lemmy.dbzer0.com

Create post
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don’t request invites, trade, sell, or self-promote

3. Don’t request or link to specific pirated titles, including DMs

4. Don’t submit low-quality posts, be entitled, or harass others


Loot, Pillage, & Plunder


💰 Please help cover server costs.


Community stats

  • 5.7K

    Monthly active users

  • 3.2K

    Posts

  • 84K

    Comments