• BigDanishGuy
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    1
    ·
    edit-2
    1 day ago

    IDK why you’re getting down voted, you’re right.

    Besides how would such a filter even work? I mean dropping all packets to specific IP addresses will lead to chaos with any organization that uses NAT or GCNAT.

    Sure, you can circumvent getting your own IP address banned, by using a tunnel, but then your tunnel gateway is the one to get banned instead. End to end encryption won’t solve the problem. Unless we actually setup a system like tor, and don’t leave our own network. But that would be pretty easy to squash, wouldn’t it? I mean a network only set up for piracy, it will get it’s main operators taken down pretty fast.

    • Chewy@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      6
      ·
      edit-2
      22 hours ago

      With I2P each user is a node/router, so it does not rely on central nodes like Tor.

      The only issue is it’s slow, because most users don’t allocate/have much bandwidth. Because of it’s garlic routing (similar to Tor’s onion routing) traffic is encrypted multiple times with multiple hops which also impacts throughput and latency.

      The good thing is it’s already suppported by qBittorrent (and BiglyBT), but setting it up is a manual process.

      Also, qBittorrent doesn’t support DHT over I2P yet, so it’s necessary to use an i2p tracker like tracker2.postman.i2p.

      But that would be pretty easy to squash, wouldn’t it? I mean a network only set up for piracy, it will get it’s main operators taken down pretty fast.

      As long as there’s reasonable doubt that i2p is only used for piracy, it shouldn’t get blocked. Similarly, Tor isn’t only used for trading drugs, so it mustn’t get blocked by democracies.