• liveinthisworld@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    Man, why is everyone like this? Please read the documentation, the traffic is encrypted and metadata cannot identify you. Unless the NSA has an active hack for I2P lying around, NO-ONE IN THIS WORLD can find out what chunks of traffic just went flying by your internet connection

    • lapis [fae/faer, comrade/them]@hexbear.net
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      2 months ago

      sure, but I2P’s end-to-end encryption is for connecting to I2P addresses, not the general internet. I’m unclear on whether every node serves as an anonymized connection to the internet, though.

      EDIT: read a little deeper! so no, not every computer connected to I2P is an internet-connected node, but, due to the limited number of internet-connected nodes, I2P does not offer the same level of anonymity that a VPN does, and may struggle from bandwidth issues.

        • lapis [fae/faer, comrade/them]@hexbear.net
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          the whole purpose of a VPN is to anonymize internet traffic, so they have many servers that send traffic out to the internet, which improves both anonymity and bandwidth. I2P is more akin to Tor, with anonymizing internet traffic as a bit of an afterthought, and the limited number of internet-connecting nodes makes users’ traffic more trackable.

          • liveinthisworld@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            0
            ·
            2 months ago

            What you’re talking about is supposed anonymity in obfuscation, and that has been proven to not work.

            Also, most VPN companies keep logs and can be subpoenaed. Not all, but most. I2P is meant to anonymize your traffic, so I do not see the point of your statement