this post was submitted on 25 Aug 2023
27 points (86.5% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
54698 readers
388 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Can you give a little more input in i2p? Where to start and what to use? Would be nice :)
Sure thing matey! I am happy to chart a course as you sail through these waters.
In short, i2p is a network within a network. Think of it as being it's own seedy town within the larger city of the internet. Any information that enters this town is end-to-end encrypted. Now, in this town, to preserve anonymity, people pass along information in paper notes. Each person accepts notes from different sources, encrypts a bundle of it, and passes it along in a chain. (hence the name "garlic routing". When it hits your "inbound tunnel," or a set of (usually 2-3) people that have been assigned to pass messages to you, they incrementally un-bundle that message until it hits you, and since you have the private key you can unencrypt the message.
Information that stays within this network are automatically anonymous. These people in your inbound tunnel do not know that the messages are being sent to you, nor do they know any information about the source. They only know that they're passing these messages along.
One way companies figure out that you've been torrenting is that they would torrent a public pirated movie file. Then, they would target the ip addresses that would actually send them that information, because they know they are seeders. These companies cannot do that in i2p, because everybody in i2p is just passing along information!
There are different options for installing i2p:
For windows, there's the i2p easy install bundle that bundles a firefox profile and automatically installs the i2p router. This uses the java implementation of i2p.
For linux, there's a java (i2p) or c++ (i2pd) implementation of the i2p router. Basically the same program but in different languages, and i2p routers can still communicate with i2pd routers and vice versa. I recommend starting with java i2p, and after trying it for a while try i2pd. There's more GUI in the java implementation, but the i2pd version is faster because cryptographic functions run faster in c++. Mental Outlaw has a good video on running i2pd on linux
If i2p is completely anonymous, does that mean we can torrent risk free using it?
Yup! I haven’t had to pay a vpn in months and have populated my jellyfin server with torrents within i2p :-)
That’s crazy! Thanks for telling me and other pirates about i2p. :)