this post was submitted on 14 Sep 2024
172 points (100.0% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

1445 readers
29 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

Regular users in Sweden are in danger because a corporation needs to fill their pockets. Studios are suing your ISPs to get to you.

Use I2P. It will hide your IP address (among the many things it can do), afford you more privacy and allow you to torrent freely, even without a VPN/seedbox. The catch? You'll have to add the I2P trackers to your torrent.

I believe I2P is the way forward for piracy and I look forward to it getting bigger than it already is.

you are viewing a single comment's thread
view the rest of the comments
[–] melroy@kbin.melroy.org 18 points 2 months ago (8 children)
[–] sploodged@lemmy.dbzer0.com 30 points 2 months ago (2 children)

similar yes but not the same. tor held together by volunteer that run nodes, i2p everyone is a node. tor good for clearnet things, i2p good for in-network things. torrenting in i2p is good for i2p, not tor. torrenting in i2p stays in the i2p network, doesn't go through exit nodes. there's only about 3 of those. it's torrenting as a darknet hidden service.

[–] melroy@kbin.melroy.org 19 points 2 months ago (1 children)

Yeah, thanks for clearing this up. I was also reading: https://geti2p.net/en/comparison/tor if people want to know more in depth.

[–] melroy@kbin.melroy.org 1 points 2 months ago (2 children)

After reading that whole page, I think your point is missing.. The use case of Tor and i2p isn't correctly explained on that site.

[–] Findmysec@infosec.pub 9 points 2 months ago

I2P is P2P, TOR is not. That is the gist of the matter

[–] sploodged@lemmy.dbzer0.com 4 points 2 months ago

yeah some of the docs on the official site lean more technical than practical

[–] AlexWIWA@lemmy.ml 11 points 2 months ago (2 children)

Does being a node open one to liability?

[–] Findmysec@infosec.pub 7 points 2 months ago

Unless there's a zero-day, no. All traffic is encrypted and it should be impossible to correlate traffic chunks to identities like that

[–] Andromxda@lemmy.dbzer0.com 6 points 2 months ago* (last edited 2 months ago)

No, since they don't act as exit nodes (they're called outproxies in I2P), unless you specifically configure that. It's like running a Tor middle/guard relay. I2P was specifically designed that way, so everyone can use I2P and be a node by default without causing any trouble.

load more comments (5 replies)