this post was submitted on 16 Jun 2023
183 points (92.2% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
54922 readers
221 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Doesn't this make every user the equivalent of a Tor exit node? Meaning you'll have possibly dodgy traffic appearing to come from your internet service?
No. I2P works differently than Tor. There are no exit nodes, because there are no exits. I2P is separate from all clearnet traffic. For example, you cannot browse reddit.com from within i2p, like you can with tor.
Gotcha. So its basically a large, decentralized overlay network...ie you can't use it to "privately" access clearnet content as you can with a VPN. Sounds like the headline is misleading.
That's exactly correct, yes. A VPN is still useful for accessing clearnet websites that you want to conceal from your ISP. I'm arguing that you don't need to go to clearnet websites for most of the stuff you download from public trackers. private trackers are always going to have great quality releases, but I could see them moving over to i2p at some point as well. Though DMCA shouldn't be much of a concern for private trackers anyway.
It's a entirely different protocol then? That's smart actually. I need to look into it.
Completely different protocol, yep. Has nothing to do with Tor really. The only similarity is that both are 'darknets'
Seems like i2p has its own version of exit nodes. So if you're not configured as an exit node you should be in the clear as all communications are end to end encrypted, so it would be difficult to impossible to determine what is passing through you as an intermediate node.