this post was submitted on 20 Sep 2024
204 points (97.2% liked)

Privacy

31890 readers
623 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 11 points 1 month ago (17 children)

What else you going to use?

[–] [email protected] 26 points 1 month ago (4 children)

I wish more people would try out I2P as a result. AFAIK, garlic routing makes this kind of attack impossible.

[–] [email protected] 11 points 1 month ago (1 children)

AFAIK it only makes it harder not impossible.

[–] [email protected] 1 points 1 month ago

At least they can't utili'e the applied tactic to host their own node.

[–] [email protected] 2 points 1 month ago (1 children)

We use it but it doesn't have the same protections or reliability as Tor

[–] [email protected] 3 points 1 month ago (1 children)
[–] [email protected] 1 points 1 month ago (1 children)

Check the FAQ

Also it lacks the more advanced features of Tor

[–] [email protected] 1 points 1 month ago* (last edited 1 month ago) (1 children)

Please mention the "advanced features" it lacks compared to TOR. I have read the FAQ

[–] [email protected] 1 points 1 month ago (1 children)

You can't use snowflakes and it can't pretend to be https

[–] [email protected] 2 points 1 month ago (1 children)

Use OpenVPN configured to look like HTTPS if you really need it. I2P is meant to be its own network, not a gateway to the clearnet. I still do not see how it has less measures in place for privacy and anonymity.

[–] [email protected] 1 points 1 month ago (1 children)

OpenVPN does not provide Onion routing and is not the same thing. You are comparing apples and oranges. Tor is well proven and battle tested. It also has the benefit of being well known and easy to use.

[–] [email protected] 1 points 1 month ago (1 children)

OpenVPN -> I2P.

I2P has been around for 20 years, it is plenty battle-tested. I do not see why you're wanting to put down I2P in favor of TOR, I still do not see how I2P is in anyway inferior in its privacy (and for the most part, anonymity) features compared to TOR. The OpenVPN addition solves your need for something akin to snowflake/TOR bridges. It is not what I2P was meant for but there's a way if you want to use it.

If your complaint is about I2P needing some configuration and time to use properly; that's a trade-off the end-user needs to decide. This doesn't have any effect on its features regarding anonymity in the I2P network. Please give me technical reasons why you think TOR can preserve your anonymity better on the TOR network than I2P can do so on its network (I have arguments in favor of I2P that I would like TOR to implement but I don't think they can)

[–] [email protected] 1 points 1 month ago (1 children)

I2p states on there website that it has potentially serious weaknesses. Also i2p has been victim to multiple attacks that shutdown the network. Furthermore, i2p DNS lacks something to be desired and finding pages can be challenging. In comparison Tor is much easier to use and requires little bandwidth. I can browse the internet but I can also access onion addresses. To say i2p is somehow a replacement for Tor is not true as i2p is considerably more complex. I use both Tor and i2p and Tor is easier to use by far. I2p has the advantage to being properly decentralized and supporting way more configuration options.

Both have there strengths and weaknesses. However, if you are in a critical situation use Tor not i2p as today it is the best for bypassing censorship while still trying to stay safe.

[–] [email protected] 1 points 1 month ago* (last edited 1 month ago)

I2p states on there website that it has potentially serious weaknesses.

The only relevant pages I found are I2P's threat model and the comparison between I2P and TOR:

Please cite your sources so everyone can understand the reasoning for your claims of I2P being weaker than TOR.

Oh, and A LOT of the attacks mentioned in the page on threat models is/was possible on TOR. The I2P project follows TOR carefully and implements some of their features/mitigations too.

If we're talking specifically about brute-force DDOS, BOTH TOR and I2P faced these issues. The good thing about I2P is that it is more decentralized than TOR which can sometimes make it easier to mitigate.

Your points about I2P's directory (not sure what you mean by DNS here) can be lumped together with your complaints about usability. This DOES NOT make TOR inherently more private, secure and anonymous than I2P, it just means that somebody on Windows can download the TBB and start browsing (in albeit a not-very-secure way). Unless you missed the news, I2P now has a slick Windows installer so people don't have to fiddle too much with it.

You're going to have to give me evidence for me to believe that using I2P makes a substantial dent in your available bandwidth. Yes you're a router in the network but it doesn't mean that you're passing through traffic at GB/s speeds.

i2p is somehow a replacement for Tor

I never said that. Again, I'm not comparing I2P and TOR based on their usability (which has changed in the recent years), I'm comparing them in terms of anonymity on the wider internet when browsing using either protocol. Both TOR and I2P are great projects, the problem is that TOR is significantly more centralized.

However, if you are in a critical situation use Tor not i2p as today it is the best for bypassing censorship while still trying to stay safe.

Cite your sources for this. This is mere conjecture unless you have proof of metadata leakage on I2P but not on TOR/actual people getting caught using I2P but being safe on TOR. I'm sure the I2P Devs would be very interested too. If you're in restrictive regimes like Iran and China where TOR/I2P traffic is flagged - use a bridge or a VPN disguised as HTTPS traffic and hope for the best (it's a perpetual cat and mouse game).

Again, please cite your sources when making claims about technical shortcomings of I2P

[–] [email protected] 1 points 1 month ago (1 children)

I've tried to use it, but have not managed to get it to work. Which is a bummer.

I should probably try again now that I have a new computer. My old computer was so old that a lot of stuff wasn't working correctly.

[–] [email protected] 5 points 1 month ago

Remember that you need to let the server run for a bit, so it can establish , the routes.

I have a service constantly running on my server. When I want to browse, I tunnel the ports to my laptop.

load more comments (12 replies)