• @[email protected]
    link
    fedilink
    253 months ago

    I wish more people would try out I2P as a result. AFAIK, garlic routing makes this kind of attack impossible.

      • @[email protected]
        link
        fedilink
        13 months ago

        At least they can’t utili’e the applied tactic to host their own node.

    • @[email protected]
      link
      fedilink
      13 months ago

      I’ve tried to use it, but have not managed to get it to work. Which is a bummer.

      I should probably try again now that I have a new computer. My old computer was so old that a lot of stuff wasn’t working correctly.

      • @[email protected]
        link
        fedilink
        53 months ago

        Remember that you need to let the server run for a bit, so it can establish , the routes.

        I have a service constantly running on my server. When I want to browse, I tunnel the ports to my laptop.

    • Possibly linux
      link
      fedilink
      English
      13 months ago

      We use it but it doesn’t have the same protections or reliability as Tor

      • @MigratingtoLemmy
        link
        English
        33 months ago

        Really? Care to explain?

        • Possibly linux
          link
          fedilink
          English
          13 months ago

          Check the FAQ

          Also it lacks the more advanced features of Tor

          • @MigratingtoLemmy
            link
            English
            1
            edit-2
            3 months ago

            Please mention the “advanced features” it lacks compared to TOR. I have read the FAQ

            • Possibly linux
              link
              fedilink
              English
              13 months ago

              You can’t use snowflakes and it can’t pretend to be https

              • @MigratingtoLemmy
                link
                English
                23 months ago

                Use OpenVPN configured to look like HTTPS if you really need it. I2P is meant to be its own network, not a gateway to the clearnet. I still do not see how it has less measures in place for privacy and anonymity.

                • Possibly linux
                  link
                  fedilink
                  English
                  13 months ago

                  OpenVPN does not provide Onion routing and is not the same thing. You are comparing apples and oranges. Tor is well proven and battle tested. It also has the benefit of being well known and easy to use.

                  • @MigratingtoLemmy
                    link
                    English
                    13 months ago

                    OpenVPN -> I2P.

                    I2P has been around for 20 years, it is plenty battle-tested. I do not see why you’re wanting to put down I2P in favor of TOR, I still do not see how I2P is in anyway inferior in its privacy (and for the most part, anonymity) features compared to TOR. The OpenVPN addition solves your need for something akin to snowflake/TOR bridges. It is not what I2P was meant for but there’s a way if you want to use it.

                    If your complaint is about I2P needing some configuration and time to use properly; that’s a trade-off the end-user needs to decide. This doesn’t have any effect on its features regarding anonymity in the I2P network. Please give me technical reasons why you think TOR can preserve your anonymity better on the TOR network than I2P can do so on its network (I have arguments in favor of I2P that I would like TOR to implement but I don’t think they can)