It seems like what i2p is doing largely overlaps with what tor does. How do the two compare, and why would you use one over the other?

  • @0v0
    link
    English
    31 year ago

    Also, unless a torrent client is specifically written with privacy in mind, they are likely to leak your real IP by connecting to trackers/peers using UDP, which is not tunneled through Tor.