this post was submitted on 21 Oct 2023
616 points (97.5% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54716 readers
399 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 
  1. It doesn't make you anonymous. Torrent protocol wasn't designed with anonymity in mind and there are a million ways you're going to leak your actual IP address.
  2. Tor is a TCP only network.
  3. While this doesn't give you the anonymity you wanted, it will hurt the network for other users.
you are viewing a single comment's thread
view the rest of the comments
[–] scarilog@lemmy.world 7 points 1 year ago (1 children)

Can you explain how the anonymity works?

[–] jack@monero.town 5 points 1 year ago

On a high level, I2P is an overlay internet on top of the regular web. Everyone has a router address that acts like a regular IP address, except that this one is purely inside the I2P software. So unlike IP addresses that go over your ISP to connect to the internet, on the I2P network your router can connect to other routers directly without the concept of ISP.

Your traffic makes multiple unidirectional hops over nodes in the network before it accesses the site/peer you want to connect with. Connection from your peer back to you goes back over another set of unidirectional nodes (unlike TOR where contacting and receiving uses the same set of nodes). The connection between the nodes uses the latest encryption methods of course.

For more details you would have to ask someone else.