this post was submitted on 01 Oct 2023
112 points (95.2% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

55099 readers
385 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 2 years ago
MODERATORS
 

I2P support anonymous torrents

TOR is good for direct downloads (DDL)

Don't know if others exist...

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 14 points 1 year ago (3 children)

I that case, why not help spread a little freedom in the rest of the world by hosting an I2P node?

We should make torrenting over I2P the default.

Any dissidents in places like China who are caught using it could then plausibly claim they were just downloading a movie.

[–] [email protected] 11 points 1 year ago

I seed around 5Tb monthly but that sounds interesting

[–] [email protected] 9 points 1 year ago (2 children)

I2P

isnt hosting a node a very easy way to get the police knocking on your door? i dont want csam flowing through my network

[–] [email protected] 7 points 1 year ago (1 children)

All traffic over I2P is encrypted unless you use an outproxy (which isn't as common as a Tor exit node is), so no. Most, if not all I2P torrenting traffic never touches an outproxy, just like Tor hidden services (.onion sites and whatnot) never touch an exit node.

Hosting a Tor relay is fine even, as you are still just passing encrypted data around. It's running an exit node that can get you into some sketchy waters with your ISP/law enforcement.

[–] brockpriv 4 points 1 year ago (1 children)

Who is running the exit nodes then? 3 letters agencies?

[–] [email protected] 4 points 1 year ago

Yeah in some cases, and in other cases it's still just volunteers with really good lawyers.

And even then, there's still no definitive link from the exit node back to the guard (entry) node/relay. And, if you're actually trying to be anonymous from 3 letter agencies, you wouldn't be messing with the clearnet (and therefore exit nodes) through Tor to begin with. You'd probably be sticking to Tor hidden services.

[–] [email protected] 1 points 9 months ago

If this was the first time the world heard of onion routing, then yes.

Now they can realize that you're probably just one step in the chain. And with i2p there's no way to know if they even reached the end of the chain (provided you host i2p for long enough).

[–] [email protected] 5 points 1 year ago

Any dissidents in places like China who are caught using it could then plausibly claim they were just downloading a movie.

You really think that would stick? Just a couple days ago there was a news article of a guy getting sued for using a VPN for remote work