I2P support anonymous torrents

TOR is good for direct downloads (DDL)

Don’t know if others exist…

  • ollie@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    11
    arrow-down
    2
    ·
    1 year ago

    I2P

    isnt hosting a node a very easy way to get the police knocking on your door? i dont want csam flowing through my network

    • pokkst@monero.town
      link
      fedilink
      English
      arrow-up
      7
      ·
      1 year ago

      All traffic over I2P is encrypted unless you use an outproxy (which isn’t as common as a Tor exit node is), so no. Most, if not all I2P torrenting traffic never touches an outproxy, just like Tor hidden services (.onion sites and whatnot) never touch an exit node.

      Hosting a Tor relay is fine even, as you are still just passing encrypted data around. It’s running an exit node that can get you into some sketchy waters with your ISP/law enforcement.

      • brockpriv
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 year ago

        Who is running the exit nodes then? 3 letters agencies?

        • pokkst@monero.town
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 year ago

          Yeah in some cases, and in other cases it’s still just volunteers with really good lawyers.

          And even then, there’s still no definitive link from the exit node back to the guard (entry) node/relay. And, if you’re actually trying to be anonymous from 3 letter agencies, you wouldn’t be messing with the clearnet (and therefore exit nodes) through Tor to begin with. You’d probably be sticking to Tor hidden services.

    • EinatYahav@lemmy.today
      link
      fedilink
      English
      arrow-up
      1
      ·
      9 months ago

      If this was the first time the world heard of onion routing, then yes.

      Now they can realize that you’re probably just one step in the chain. And with i2p there’s no way to know if they even reached the end of the chain (provided you host i2p for long enough).