49 points

Adoption is the main problem. The more people that will use I2P the better. Also crosseeding helps a load to.

permalink
report
reply
35 points

i misread that as

Also crossdressing helps […]

and i didnt even question it

permalink
report
parent
reply
20 points

The next step after programmer socks

permalink
report
parent
reply
9 points

also just known as regular socks if you use i2p

permalink
report
parent
reply
10 points

But crossdressing does help a load

permalink
report
parent
reply
1 point

Haha Yeah.

permalink
report
parent
reply
5 points

Is seeding anonymous?

permalink
report
parent
reply
7 points

When done solely over I2P, yes.

permalink
report
parent
reply
2 points

Say you download from the clearweb then use a VPN. Then reseed that downloaded file straight to I2P.

permalink
report
parent
reply
26 points
*

You can’t connect to peers outside the i2p network And i personally haven’t found any active torrenting community for i2p So yeah i2p is really cool, but i don’t think you can pirate over it just yet

permalink
report
reply
29 points
*

http://tracker2.postman.i2p are u sure? And also u can conbect to outside world with special proxy

permalink
report
parent
reply
2 points

Tell me more about this special proxy

permalink
report
parent
reply
5 points
*

https://mk16.de/assets/docs/outproxies_in_i2p-english.pdf simple and detailed explanation as the same time

permalink
report
parent
reply
13 points

That’s why we need more adoption.

permalink
report
parent
reply
8 points

Postman has a quite active community, you can find a lot of stuff there already. It’s not quite on the level of clearnet torrenting yet, of course, but it can very much stand on its own

permalink
report
parent
reply
6 points

Does p2p over i2p require port forwarding? I have a cheap vpn (surfshark) that does not have port forwarding and i am almost never able to seed over it. Will seeding over i2p require port forwarding?

permalink
report
parent
reply
5 points

It functions without port forwarding, but it’s much better with. While I can’t speak for the Java client, i2pd has support for UPnP, which might make things easier in some environments. You also don’t need a VPN for I2P, since the network takes care of the anonymising

permalink
report
parent
reply
3 points

it’s generally advisable to not run a vpn in front of i2p. it will run better without one and you introduce another point of failure that can reduce your anonymity in some circumstances.

permalink
report
parent
reply
2 points

Can’t answer that sorry, i barely tried i2p

permalink
report
parent
reply
1 point
*

Does p2p over i2p require port forwarding?

No, you’ll torrent fine via I2P without port forwarding. Note that the torrents are running through the I2P network so technically you wouldn’t want to open your torrent client to the clearnet anyway. It’d be like purposely introducing a VPN leak in your VPN setup by allowing it traffic outside the VPN (or in this case I2P).

Been a bit since I’ve tinkered with torrents over I2P but for a while I was seeding torrents over I2P and would get pretty good seed/upload speeds to other torrent peers. Was mainly testing with i2psnark and BiglyBT.

Fun fact: Torrent hashes don’t change, so that same exact torrent you might download at TPB or wherever would still download within I2P as long as there’s someone seeding it there.

Also see https://geti2p.net/en/faq#ports

Not exactly what you’re asking but you can open a port forward for I2P itself to better communicate with other I2P routers. “routers” in this case usually means other people running I2P.

permalink
report
parent
reply
5 points

we’re trying, also some clients will let you do that. snark and XD are i2p only, qbittorrent and bigly bt will let you pull peers from clearnet and i2p if they’ve been cross-seeded

permalink
report
parent
reply
2 points

But then you give away your ip, no?

permalink
report
parent
reply
3 points

you can use a vpn for clearnet like normal along with i2p,ideally i2p not through the vpn though. it’s a good way to cross-seed stuff into i2p though (you can do this as you’re downloading from clearnet peers) and every now and again might find some random i2p seed holdout on a “rare” torrent.

permalink
report
parent
reply
2 points
*

postman tracker was already shared somewhere around here, i recommend checking that out

ofc it’s nowhere near the level of clearnet but i’ve had good luck finding technical books as a test

download speed was pretty abysmal when i tried it a few years ago though so i didnt bother with anything bigger than 1 gb or so (took a few days to download a sizable book compilation)

permalink
report
parent
reply
23 points

Love it when Mental Outlaw makes a video about i2p

Check out his other i2p videos

https://youtube.com/watch?v=KhG29riqVUE

https://youtu.be/F6ze6S1aDJs

permalink
report
reply
11 points

If someone is actually trying to convict you just based on the correlation of the connection times, you probably don’t just share a copyrighted movie. So why mentioning this as an actual threat in the first place?

permalink
report
reply
18 points

Because it makes the point for a more solid technology as far as privacy is concerned?

permalink
report
parent
reply
2 points

Is this the only point, when it comes to security? In my experience, the ease of use is also a factor. Today, VPN clients are just one button and it runs. I2P is almost there, but requires you to setup some configs manually. So is it really worth to drive a tank to just go grocery shopping?

permalink
report
parent
reply
2 points

It is not the only point when it comes to adopting technologies, when it comes to maximizing privacy, yes maximizing privacy is tautologically the only point.

permalink
report
parent
reply
9 points

There’s nothing saying that tomorrow this isn’t the case. Laws are fluid, just because they won’t come after people currently for small time piracy does not mean that won’t change.

permalink
report
parent
reply
3 points
*

Tomorrow passwords will be cracked in no time, because most algorithms are not quantum safe. Same with password length.

I never said it is not an attack vector. There are dozens if not hundreds. The question is about the probability, which is always a dimension if you manage risks. There is no need to list all theoretical possible attack vectors, if the probability of actually happening only affects 2 people on this planet.

Videos for educational purposes should not sensationalize unlikely attacks, as it only causes unnecessary fear. I’d rather have someone using torrent on VPN than not using anything at all because they are now afraid of the government.

permalink
report
parent
reply
2 points

In germany they fine your ass if they find out you’re torrenting.

permalink
report
parent
reply
1 point

That’s not what I was talking about?

permalink
report
parent
reply
9 points

Are the red caps just a coincidence? Because lately, the more videos I see of him, the more conservative he seems to me

permalink
report
reply
29 points
*

i mean the dude does end up uploading a torrent of a jordan p*terson video as an example so that’s pretty sus, at the very least

permalink
report
parent
reply
8 points
*

His actual computer related stuff has good advice in it but a lot surrounding that advice is indeed pretty sus or extrapolates to clownish end analysis. Like Ford patenting a speeding snitcher to put in their cars that reports other nearby speeding vehicles to the police is going to lead to the end of non-autonomous driving. I wonder if “car dependency” means anything to him. Just engage with it critically.

permalink
report
parent
reply
1 point
*

“just engage with him critically”

how about i just follow better channels instead lmao

permalink
report
parent
reply
6 points

Guy has always been a far right-wing cuck

permalink
report
parent
reply
-1 points
Removed by mod
permalink
report
parent
reply

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

!piracy@lemmy.dbzer0.com

Create post
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don’t request invites, trade, sell, or self-promote

3. Don’t request or link to specific pirated titles, including DMs

4. Don’t submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-fi Liberapay

Community stats

  • 4.8K

    Monthly active users

  • 3.3K

    Posts

  • 86K

    Comments