![]() (the official Java based implementation) We should also make sure there's plenty of good content available on the I2P network (yes, I am gradually working on this). People should be as aware of I2P as Tor and it should be extremely easy to use it. Tor sucks all the oxygen out of the room while having not adequately addressed the serious flaws in its design.Īlthough I know there are reasons why people would be interested in running at Tor bridge and using Tor right in this moment, in the long term, we'd be of better help to the world if we worked on bettering and promoting a network project that is overall better for the censored user in the long term. If we want censorship-free communication that's as anonymous as can be, then give up on a formalized way of accessing the clearnet and prefer internal networking rather than running glorified VPN proxies. Depending on the regime a person is subject to, their use of Tor can potentially backfire on them because the flawed network design. Hidden sites are faster on I2P than on TorĪbove all, if you have this concept of an "exit" node then it's feasible to observe exit nodes and correlate traffic to a clearnet destination with individual users. A totally separate or private P2P network is much easier to form with I2P than Tor. I2P has a sort of DNS system built-in that Tor lacks. It's not designed to be a clearnet proxy, thus there are no "exit" nodes although hidden sites (aka eepsites) can of course be made to forward requests to the clearnet. ![]() ![]() All nodes have the same role, so there's no distinction between nodes in terms of whether they are an entrance relay or any other user. What we should be doing is encouraging people to use I2P and making it as accessible to the public as Tor (and even more so). By design, governments can figure out that you're using Tor and what your "role" is, which is bad for both the users and those hosting bridges. If you're going to run one, you might as well host it remotely so that there are extra steps in a state figuring out that you are trafficking other people's data. I'm pretty pessimistic about Tor and if I were to run a bridge or relay I definitely wouldn't run it locally.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |