this post was submitted on 01 Oct 2023
113 points (95.2% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

53843 readers
514 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder


💰 Please help cover server costs.

Ko-FiLiberapay


founded 1 year ago
MODERATORS
 

I2P support anonymous torrents

TOR is good for direct downloads (DDL)

Don't know if others exist...

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 14 points 11 months ago (3 children)

I that case, why not help spread a little freedom in the rest of the world by hosting an I2P node?

We should make torrenting over I2P the default.

Any dissidents in places like China who are caught using it could then plausibly claim they were just downloading a movie.

[–] [email protected] 11 points 11 months ago

I seed around 5Tb monthly but that sounds interesting

[–] [email protected] 9 points 11 months ago (2 children)

I2P

isnt hosting a node a very easy way to get the police knocking on your door? i dont want csam flowing through my network

[–] [email protected] 7 points 11 months ago (1 children)

All traffic over I2P is encrypted unless you use an outproxy (which isn't as common as a Tor exit node is), so no. Most, if not all I2P torrenting traffic never touches an outproxy, just like Tor hidden services (.onion sites and whatnot) never touch an exit node.

Hosting a Tor relay is fine even, as you are still just passing encrypted data around. It's running an exit node that can get you into some sketchy waters with your ISP/law enforcement.

[–] [email protected] 4 points 11 months ago (1 children)

Who is running the exit nodes then? 3 letters agencies?

[–] [email protected] 4 points 11 months ago

Yeah in some cases, and in other cases it's still just volunteers with really good lawyers.

And even then, there's still no definitive link from the exit node back to the guard (entry) node/relay. And, if you're actually trying to be anonymous from 3 letter agencies, you wouldn't be messing with the clearnet (and therefore exit nodes) through Tor to begin with. You'd probably be sticking to Tor hidden services.

[–] [email protected] 1 points 6 months ago

If this was the first time the world heard of onion routing, then yes.

Now they can realize that you're probably just one step in the chain. And with i2p there's no way to know if they even reached the end of the chain (provided you host i2p for long enough).

[–] LiveLM 5 points 11 months ago

Any dissidents in places like China who are caught using it could then plausibly claim they were just downloading a movie.

You really think that would stick? Just a couple days ago there was a news article of a guy getting sued for using a VPN for remote work