this post was submitted on 13 Sep 2024
549 points (95.5% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

55016 readers
636 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] lapis@hexbear.net 1 points 3 months ago* (last edited 3 months ago) (1 children)

sure, but I2P’s end-to-end encryption is for connecting to I2P addresses, not the general internet. I’m unclear on whether every node serves as an anonymized connection to the internet, though.

EDIT: read a little deeper! so no, not every computer connected to I2P is an internet-connected node, but, due to the limited number of internet-connected nodes, I2P does not offer the same level of anonymity that a VPN does, and may struggle from bandwidth issues.

[–] liveinthisworld@lemmy.dbzer0.com 1 points 3 months ago (1 children)

I can understand the argument against bandwidth, but how do you conclude that it is not anonymous enough? Even against a VPN?

[–] lapis@hexbear.net 2 points 3 months ago (1 children)

the whole purpose of a VPN is to anonymize internet traffic, so they have many servers that send traffic out to the internet, which improves both anonymity and bandwidth. I2P is more akin to Tor, with anonymizing internet traffic as a bit of an afterthought, and the limited number of internet-connecting nodes makes users' traffic more trackable.

[–] liveinthisworld@lemmy.dbzer0.com 1 points 3 months ago (1 children)

What you're talking about is supposed anonymity in obfuscation, and that has been proven to not work.

Also, most VPN companies keep logs and can be subpoenaed. Not all, but most. I2P is meant to anonymize your traffic, so I do not see the point of your statement

[–] lapis@hexbear.net 1 points 3 months ago

What you're talking about is supposed anonymity in obfuscation, and that has been proven to not work.

if it's been proven not to work, then neither I2P nor VPN is worth using, no?

most VPN companies keep logs and can be subpoenaed.

well, sure, but that's why anybody looking into a VPN is generally advised to use specific, known-good VPN providers who don't keep logs and who, preferably, aren't headquartered in a country with strict IP law.