this post was submitted on 21 Oct 2023
4 points (100.0% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54669 readers
417 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 
  1. It doesn't make you anonymous. Torrent protocol wasn't designed with anonymity in mind and there are a million ways you're going to leak your actual IP address.
  2. Tor is a TCP only network.
  3. While this doesn't give you the anonymity you wanted, it will hurt the network for other users.
you are viewing a single comment's thread
view the rest of the comments
[–] supervent@lemmy.dbzer0.com 1 points 1 year ago (1 children)

For bittorrent and p2p it is better to use i2p, tor only to surf the internet.

[–] atlasraven31@lemm.ee 0 points 1 year ago (1 children)

Mind giving a little info about i2p for the clueless?

[–] ReversalHatchery@beehaw.org 0 points 1 year ago* (last edited 1 year ago) (1 children)

It is a different anonymity network, which works differently in many aspects.

I2P and Tor comparison: https://geti2p.net/en/comparison/tor
I2P on Bittorrent (mostly a client dev guide, but has some interesting info): https://geti2p.net/en/docs/applications/bittorrent

Currently BiglyBt supports I2P and it has been that way for quite some time.
If you use qBittorrent, I2P support will come in version 4.6. you can try it out now with the published release candidate version. Probably other clients are working on it too as the support is coming from the libtorrent programming library, which is used by other clients too.

Right now, I2P is quite slow in my experience, in terms of loading I2P websites. I hope that it's just a misconfiguration on my part, or that these specific sites I tried are just overloaded.

[–] NuXCOM_90Percent@lemmy.zip 0 points 1 year ago (1 children)

...

Near as I can tell:

Tor is about privacy (and is prone to being compromised but...). So long as the exit nodes are in "friendly" countries and are run by trustworthy individuals (...), you are "safe". And that is why it is popular among journalists. The downside being that a lot of heinous shit is done on Tor and those exit nodes are potentially liable for them.

I2P is about avoiding censorship. Everyone is an exit node and cops kicking down doors doesn't significantly hurt the network.

But... I would very much NOT use that for torrenting. Because the endpoints can still be detected and recorded. And "I wasn't downloading that Tay Swizzle concert, I was just letting potentially thousands of other people use my computer to download it... Why did you suddenly start laughing and talking about The Pirate Bay?".

And that also ignores the "darker" parts of the dark web. Where, rather than getting a letter from the MPAA you get a visit from Chris Hansen.

[–] nybble41@programming.dev -1 points 1 year ago (1 children)

It is not true that every node is an exit node in I2P. The I2P protocol does not officially have exit nodes—all I2P communication terminates at some node within the I2P network, encrypted end-to-end. It is possible to run a local proxy server and make it accessible to other users as an I2P service, creating an "exit node" of sorts, but this is something that must be set up deliberately; it's not the default or recommended configuration. Users would need to select a specific I2P proxy service (exit node) to forward non-I2P traffic through and configure their browser (or other network-based programs) to use it.

[–] NuXCOM_90Percent@lemmy.zip 1 points 1 year ago (1 children)

Maybe I am missing something but that just feels like you are arguing semantics.

Traffic exits the sub-WAN from basically any of the computers/nodes in it. So it might not be a Tor Exit Node (TM) but it still has all the dangers of it.

[–] nybble41@programming.dev 0 points 1 year ago* (last edited 1 year ago) (1 children)

No, that's not how I2P works.

First, let's start with the basics. An exit node is a node which interfaces between the encrypted network (I2P or Tor) and the regular Internet. A user attempting to access a regular Internet site over I2P or Tor would route their traffic through the encrypted network to an exit node, which then sends the request over the Internet without the I2P/Tor encryption. Responses follow the reverse path back to the user. Nodes which only establish encrypted connections to other I2P or Tor nodes, including ones used for internal (onion) routing, are not exit nodes.

Both I2P and Tor support the creation of services hosted directly through the encrypted network. In Tor these are referred to as onion services and are accessed through *.onion hostnames. In I2P these internal services (*.i2p or *.b32) are the only kind of service the protocol directly supports—though you can configure a specific I2P service linked to a HTTP/HTTPS proxy to handle non-I2P URLs in the client configuration. There are only a few such proxy services as this is not how I2P is primarily intended to be used.

Tor, by contrast, has built-in support for exit nodes. Routing traffic anonymously from Tor users to the Internet is the original model for the Tor network; onion services were added later. There is no need to choose an exit node in Tor—the system maintains a list and picks one automatically. Becoming a Tor exit node is a simple matter of enabling an option in the settings, whereas in I2P you would need to manually configure a proxy server, inform others about it, and have them adjust their proxy configuration to use it.

If you set up an I2P node and do not go out of your way to expose a HTTP/HTTPS proxy as an I2P service then no traffic from the I2P network can be routed to non-I2P destinations via your node. This is equivalent to running a Tor internal, non-exit node, possibly hosting one or more onion services.

[–] NuXCOM_90Percent@lemmy.zip 1 points 1 year ago

Fair enough. Then you have the exact same risks as far as torrenting (the point of this thread) are confirmed. But still increased risks as far as csam.