this post was submitted on 16 Jun 2023
139 points (100.0% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
1444 readers
4 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Doesn't this make every user the equivalent of a Tor exit node? Meaning you'll have possibly dodgy traffic appearing to come from your internet service?
Seems like i2p has its own version of exit nodes. So if you're not configured as an exit node you should be in the clear as all communications are end to end encrypted, so it would be difficult to impossible to determine what is passing through you as an intermediate node.