It seems like what i2p is doing largely overlaps with what tor does. How do the two compare, and why would you use one over the other?
It seems like what i2p is doing largely overlaps with what tor does. How do the two compare, and why would you use one over the other?
They do similar things, but while TOR seems geared towards surfing the regular web anonymously, I2P is more self contained.
Some fairly good explanations here: https://www.cloudwards.net/i2p-vs-tor/
Also, I don’t think you can torrent over TOR, but I’m not sure about that.
You can torrent over TOR but it is highly discouraged. because it will put a increased load on the network.
Also, unless a torrent client is specifically written with privacy in mind, they are likely to leak your real IP by connecting to trackers/peers using UDP, which is not tunneled through Tor.
It’s not discouraged in I2P, so torrent away. :-)