What you’re talking about is supposed anonymity in obfuscation, and that has been proven to not work.
Also, most VPN companies keep logs and can be subpoenaed. Not all, but most. I2P is meant to anonymize your traffic, so I do not see the point of your statement
What you’re talking about is supposed anonymity in obfuscation, and that has been proven to not work.
Also, most VPN companies keep logs and can be subpoenaed. Not all, but most. I2P is meant to anonymize your traffic, so I do not see the point of your statement