• Captain Aggravated
    link
    fedilink
    English
    arrow-up
    29
    arrow-down
    2
    ·
    17 hours ago

    Explain to me how that works if the traffic is end to end encrypted.

    • sudoku@programming.dev
      link
      fedilink
      English
      arrow-up
      26
      arrow-down
      5
      ·
      17 hours ago

      you can’t end to end encrypt the traffic destination or else no one will know where to route said traffic. this isn’t tor.

      • Captain Aggravated
        link
        fedilink
        English
        arrow-up
        5
        ·
        8 hours ago

        So they’re not checking the contents for copyright violations, but the source and destination.

      • BigDanishGuy
        link
        fedilink
        English
        arrow-up
        14
        arrow-down
        1
        ·
        edit-2
        14 hours ago

        IDK why you’re getting down voted, you’re right.

        Besides how would such a filter even work? I mean dropping all packets to specific IP addresses will lead to chaos with any organization that uses NAT or GCNAT.

        Sure, you can circumvent getting your own IP address banned, by using a tunnel, but then your tunnel gateway is the one to get banned instead. End to end encryption won’t solve the problem. Unless we actually setup a system like tor, and don’t leave our own network. But that would be pretty easy to squash, wouldn’t it? I mean a network only set up for piracy, it will get it’s main operators taken down pretty fast.

        • Chewy@discuss.tchncs.de
          link
          fedilink
          English
          arrow-up
          6
          ·
          edit-2
          12 hours ago

          With I2P each user is a node/router, so it does not rely on central nodes like Tor.

          The only issue is it’s slow, because most users don’t allocate/have much bandwidth. Because of it’s garlic routing (similar to Tor’s onion routing) traffic is encrypted multiple times with multiple hops which also impacts throughput and latency.

          The good thing is it’s already suppported by qBittorrent (and BiglyBT), but setting it up is a manual process.

          Also, qBittorrent doesn’t support DHT over I2P yet, so it’s necessary to use an i2p tracker like tracker2.postman.i2p.

          But that would be pretty easy to squash, wouldn’t it? I mean a network only set up for piracy, it will get it’s main operators taken down pretty fast.

          As long as there’s reasonable doubt that i2p is only used for piracy, it shouldn’t get blocked. Similarly, Tor isn’t only used for trading drugs, so it mustn’t get blocked by democracies.