I hear I2P had a lot of potential, but also a lot of issues. Haven’t checked up on that project in a bit. I know it was a removed to set up when I tried plinking with it some years ago.
So TOR (despite the latency/speed issues and its own security concerns) is still probably about as good as it gets.
I think people shouldn’t be using Tor for daily usage. It just slows down the network for those who actually need it. It would be better if people donated to the Tor project or ran their nodes instead
Kinda get the vibe that guy I’m replying to is asking for the times when its actually needed. If I’ve got the wrong mark there and they’re looking for daily driving, then Mullvad VPN (or comparable) is probably the better way to go.
Yeah, Mullvad seems to have done the most to prove that they’re not harvesting your data. You still have to trust them, but there’s evidence that they’re trying.
Yea, i2p is slightly more involved than just starting up tor browser, but its not that bad. The real problem for this case is that it doesnt have exit nodes built into the protocol, so getting to the internet is a bit harder.
So, if I recall correctly, I had to set up a device as an i2p server (seems like they were super light weight and you could configure your phone to do it) and then you could use your browser of choice with the “i2p server” as a proxy.
Its my understanding that each of the “i2p servers” acted as both an entry point and an exit point. That is to say, while my traffic entered the network there, there were other people’s traffic that could be routed through and/or exit via my server.
Yep, almost. Every* i2p node also acts as a relay, which not only helps the network, but also your anonymity, by drowning out your traffic. It however only does this inside the network, it doesnt work like an exit node.
By default, it does run a proxy, so that you can access i2p addresses using a browser set up to use it. It also lets you use the proxy to access the internet over i2p, but you have to choose an exit node manually (tho iirc there is one set up as default, which is fairly centralized, but still should be anonymous thanks for the rest of the network). A slight difference from Tor is also that these are protocol level proxies, so you will for example not be able to connect to a clearnet ssh server over these.
Probably TOR.
I hear I2P had a lot of potential, but also a lot of issues. Haven’t checked up on that project in a bit. I know it was a removed to set up when I tried plinking with it some years ago.
So TOR (despite the latency/speed issues and its own security concerns) is still probably about as good as it gets.
I think people shouldn’t be using Tor for daily usage. It just slows down the network for those who actually need it. It would be better if people donated to the Tor project or ran their nodes instead
Completely agree.
Kinda get the vibe that guy I’m replying to is asking for the times when its actually needed. If I’ve got the wrong mark there and they’re looking for daily driving, then Mullvad VPN (or comparable) is probably the better way to go.
Yeah, Mullvad seems to have done the most to prove that they’re not harvesting your data. You still have to trust them, but there’s evidence that they’re trying.
Yea, i2p is slightly more involved than just starting up tor browser, but its not that bad. The real problem for this case is that it doesnt have exit nodes built into the protocol, so getting to the internet is a bit harder.
So, if I recall correctly, I had to set up a device as an i2p server (seems like they were super light weight and you could configure your phone to do it) and then you could use your browser of choice with the “i2p server” as a proxy.
Its my understanding that each of the “i2p servers” acted as both an entry point and an exit point. That is to say, while my traffic entered the network there, there were other people’s traffic that could be routed through and/or exit via my server.
Am I wrong on that assessment?
Yep, almost. Every* i2p node also acts as a relay, which not only helps the network, but also your anonymity, by drowning out your traffic. It however only does this inside the network, it doesnt work like an exit node.
By default, it does run a proxy, so that you can access i2p addresses using a browser set up to use it. It also lets you use the proxy to access the internet over i2p, but you have to choose an exit node manually (tho iirc there is one set up as default, which is fairly centralized, but still should be anonymous thanks for the rest of the network). A slight difference from Tor is also that these are protocol level proxies, so you will for example not be able to connect to a clearnet ssh server over these.
*https://geti2p.net/en/about/restrictive-countries
Interesting.
It looks I was close on my understanding, but not quite there. Lol, guess I’ll need to bust this back open.