[ 3 / biz / cgl / ck / diy / fa / ic / jp / lit / sci / vr / vt ] [ index / top / reports ] [ become a patron ] [ status ]
2023-11: Warosu is now out of extended maintenance.

/biz/ - Business & Finance

Search:


View post   

>> No.56057348 [View]
File: 207 KB, 1200x1200, PurpleI2P.png [View same] [iqdb] [saucenao] [google]
56057348

>>56056722
>explain further.. people said the opposite for so many years and now suddenly i2p is so much better?


I2P is better optimized for hidden services because that's ALL it does by default, Tor has to juggle being a clearnet proxy as well, which increases the risk of crossover data leakage.

I2P scales better with more users since its an actual P2P network that seeds data rather than just leeching it as per Tor.

I2P is a fully underground cypherpunk project developed by crypto-anarchists, Tor was started by the US govt and is still funded by them to this day.

The average user is too ignorant to know better so forcing I2P adoption is necessary the same way forcing XMR adoption on DNMs has proven to be the only way to get rid of BTC, if it was up to normies BTC would still be the only option there.


>Is Tor Trustworthy and Safe?

>There is a growing chorus of people who blindly recommend Tor to anyone looking for online anonymity. This recommendation often ignores mountains of evidence suggesting that Tor is not the “privacy tool” it’s made out to be.

>No privacy tool is above criticism or scrutiny, and each has pros and cons. Unfortunately, Tor has garnered a cult-like following in recent years among people who pretend it’s infallible. Honest criticism of Tor is often met with accusations of “FUD” and ad-hominem attacks, so as not to disrupt the collective Groupthink.

https://restoreprivacy.com/tor/

>> No.55820628 [View]
File: 207 KB, 1200x1200, PurpleI2P.png [View same] [iqdb] [saucenao] [google]
55820628

>>55819111
>What kind of legal risks are involved with running an I2P node on an AWS EC2 instance?

There are none.

>> No.54848146 [View]
File: 207 KB, 1200x1200, PurpleI2P.png [View same] [iqdb] [saucenao] [google]
54848146

>>54846231
>how do i find this

http://drugula44brpin5w2xk6j3adll35pp3zdihqqkndhg336j55pwdtufyd.onion/

And if any DNM admins are lurking in here, for the love of Allah set up an I2P mirror for your onions, its CURRENT_YEAR!

>> No.54699441 [View]
File: 207 KB, 1200x1200, I2P.png [View same] [iqdb] [saucenao] [google]
54699441

>>54698187
I only like XMR. Everything else seems too far from the idea of peer to peer electronic cash. Maybe eth if it wasn't for the fact that it is basically just a corporate funded ponzi now that they are proof of stake, that and smart contracts not being necessary for a large majority of use cases (I still enjoy hearing about them getting exploited though, funny).

>> No.54682739 [View]
File: 207 KB, 1200x1200, PurpleI2P.png [View same] [iqdb] [saucenao] [google]
54682739

>>54662661
>shill me i2p
>how is it different from tor?

Repost from a relevant thread on Dread's d/OpSec board

-----------------------------

I2P's fingerprint is significantly harder to place. Tor has a very loud and in-your-face fingerprint, that no combination of bridges or vpns can cover. I2P traffic uses tcp, udp, ipv4, ipv6, which automatically blends you in better than Tor (Tor uses tcp only and is mostly ipv4).

I2P has automatic metadata obfuscation protocols in place, too. I2P pads each message (so the byte size is random, compared to Tor's 512 byte size messages every time), I2P adds delays to each message (which helps defend against timing attacks, each message is randomly delayed by however many milisecs). An adversary could tell you are using an encrypted routing protocol, but would be hard pressed to determine exactly which protocol you are using without using DPI techniques (which hopefully they have no reason to use because you blend in better)

I2P network is set up for plausible deniability from the beginning. Every I2P user is also a router (compared to a relay in Tor). Any adversary watching the network could not accuratley say whether your IP is using I2P, routing someone elses I2P traffic, or hosting an I2P eepsite. I2P routers are unidirectional, compared to Tor relays being bidirectional. Which means, you always have traffic coming in through you and exiting through you, trying to determine whether you are actively using I2P to browse or passively routing someone else's traffic is impossible.

>> No.54492384 [View]
File: 207 KB, 1200x1200, PurpleI2P.png [View same] [iqdb] [saucenao] [google]
54492384

>>54491444
>Now what?

Nothing, that's all you had to do, your node is up and running. Just keep running it.

Optionally, you can configure your browser's proxy settings and start browsing the darkweb.

>> No.54372703 [View]
File: 207 KB, 1200x1200, I2P.png [View same] [iqdb] [saucenao] [google]
54372703

>>54371784
>VPN
Fuck off.

>> No.54309839 [View]
File: 207 KB, 1200x1200, PurpleI2P.png [View same] [iqdb] [saucenao] [google]
54309839

>>54306795
>torrent your goyslop over i2p you niggers. i2p needs more use, more visibility among the devs, coders, and hackers. Run your monero node over i2p you niggers.
>
>i2p is what tor wished it would be.

To get more people involved we basically need more Monero-related content on I2P e.g. dedicated forum/imageboard with perhaps an accompanying IRC chatroom. There's already a dedicated Prestium IRC room on I2Pd's ilita server.

Shit, an /XMR/ General on I2P might just do the trick, the slightly higher barrier to entry would help filter out the mouth-breathing retards.

Navigation
View posts[+24][+48][+96]