It seems like what i2p is doing largely overlaps with what tor does. How do the two compare, and why would you use one over the other?

  • @[email protected]
    link
    fedilink
    English
    91 year ago

    I2P is completely decentralized, while tor still has some centralization. When you start connecting to i2p your i2p router looks for the IP of a floodfill router, floodfill routers are other routers, just like yours, except they also have the responsibility of sharing other i2p routers they are aware of. Since any router can be a floodfill the network is harder to take down. Obviously i2p has to get the first floodfills ip somehow, and to do that i believe it does the exact same thing as tor, connect to a regular i2p run server and pickup the ips of some floodfills, however unlike tor, once your router becomes aware of other routers it becomes completely decentralized and P2P.

    Meanwhile, tor has a centralized list of all the (public, aka not bridges) nodes that your browser uses to make the tunnel.

    When you connect to an eepsite (I2Ps version of onionsite) your traffic will leave through an “outgoing tunnel” which consists of 3 (default, this is customizable) other i2p routers and then is passed onto the webservers “incoming tunnel”. Every router has a set of incoming and outgoing tunnels which are used for communication, unlike tor where you have one tunnel that is established with the website and is used for both sending and receiving. When the website receives the traffic, it will respond on one of its “outgoing tunnels”, which consists of a different set of random i2p routers and will send that traffic to one of your “incoming tunnels”.

    Because of this, a round trip for your connection consists of 12 nodes total making it far less possible for any participant to be identified, instead of tors 6 (6 for onionsites, 3 for clearweb)

    This is the best graphic i can find to explain it since I feel ive not done I2P justice. This video does a much better job at explaining i2p and goes super in-depth.

    • @CAVOKM
      link
      English
      41 year ago

      Brilliant and very detailed answer. Thank you!

  • @CAVOKM
    link
    English
    31 year ago

    They do similar things, but while TOR seems geared towards surfing the regular web anonymously, I2P is more self contained.

    Some fairly good explanations here: https://www.cloudwards.net/i2p-vs-tor/

    Also, I don’t think you can torrent over TOR, but I’m not sure about that.

    • @kylian0087
      link
      English
      31 year ago

      You can torrent over TOR but it is highly discouraged. because it will put a increased load on the network.

      • @0v0
        link
        English
        31 year ago

        Also, unless a torrent client is specifically written with privacy in mind, they are likely to leak your real IP by connecting to trackers/peers using UDP, which is not tunneled through Tor.

      • @CAVOKM
        link
        English
        11 year ago

        It’s not discouraged in I2P, so torrent away. :-)