• @[email protected]
    link
    fedilink
    262 months ago

    I wish more people would try out I2P as a result. AFAIK, garlic routing makes this kind of attack impossible.

    • Possibly linux
      link
      fedilink
      English
      22 months ago

      We use it but it doesn’t have the same protections or reliability as Tor

          • @[email protected]
            link
            fedilink
            English
            1
            edit-2
            2 months ago

            Please mention the “advanced features” it lacks compared to TOR. I have read the FAQ

              • @[email protected]
                link
                fedilink
                English
                22 months ago

                Use OpenVPN configured to look like HTTPS if you really need it. I2P is meant to be its own network, not a gateway to the clearnet. I still do not see how it has less measures in place for privacy and anonymity.

                • Possibly linux
                  link
                  fedilink
                  English
                  12 months ago

                  OpenVPN does not provide Onion routing and is not the same thing. You are comparing apples and oranges. Tor is well proven and battle tested. It also has the benefit of being well known and easy to use.

                  • @[email protected]
                    link
                    fedilink
                    English
                    12 months ago

                    OpenVPN -> I2P.

                    I2P has been around for 20 years, it is plenty battle-tested. I do not see why you’re wanting to put down I2P in favor of TOR, I still do not see how I2P is in anyway inferior in its privacy (and for the most part, anonymity) features compared to TOR. The OpenVPN addition solves your need for something akin to snowflake/TOR bridges. It is not what I2P was meant for but there’s a way if you want to use it.

                    If your complaint is about I2P needing some configuration and time to use properly; that’s a trade-off the end-user needs to decide. This doesn’t have any effect on its features regarding anonymity in the I2P network. Please give me technical reasons why you think TOR can preserve your anonymity better on the TOR network than I2P can do so on its network (I have arguments in favor of I2P that I would like TOR to implement but I don’t think they can)

    • @[email protected]
      link
      fedilink
      12 months ago

      I’ve tried to use it, but have not managed to get it to work. Which is a bummer.

      I should probably try again now that I have a new computer. My old computer was so old that a lot of stuff wasn’t working correctly.

      • @[email protected]
        link
        fedilink
        52 months ago

        Remember that you need to let the server run for a bit, so it can establish , the routes.

        I have a service constantly running on my server. When I want to browse, I tunnel the ports to my laptop.