this post was submitted on 23 Oct 2023
500 points (98.4% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

53843 readers
534 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder


💰 Please help cover server costs.

Ko-FiLiberapay


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Oha@lemmy.ohaa.xyz 92 points 10 months ago (45 children)

can someone eli5 i2p to me?

[–] RyeMan@lemmy.world 203 points 10 months ago* (last edited 10 months ago) (35 children)

Others have summarized it well but I'll add my perspective also.

I2P is a decentralized network of peers. All traffic gets routed through multiple peers before reaching its destination. Traffic is also encrypted by multiple layers of encryption and each connected peer can only decrypt one layer, that layer will only contain further routing info so that peer knows the next place to hand off your data. The encryption gets stripped layer by layer until it finally reaches its destination.

What this ultimately means is that by interacting with a website or service through I2P it is virtually impossible to identify any information the user is sending or receiving and it is also impossible to tell where the connections are going or coming from.

To make things even more interesting all I2P routers by default also contribute resources back into the network so while your I2P Router is handling your communication connections, it's also volunteering to be a connection node in someone else's connection. This adds further security because now you've got many Peer to Peer connections going in and out of your network, all encrypted so any prying eyes will have an exceedingly difficult time trying to make sense of any of your internet traffic.

Tor relies on the good faith of its community to contribute resources to the network and it's not very well incentivised causing its resources to be far more limited and bogged down. For this reason, Tor cannot sustain heavy torrent traffic without easily being overwhelmed. In I2P, every user is a contributor so the more people who use I2P, the faster and better it becomes.

The big advantage Tor has over I2P are outproxies and the beautifully prepacked Tor Browser. Tor has a lot more influence and money backing it so there are some large and well protected entities that can afford all the legal trouble that outproxies can bring. Unfortunately there just isn't enough money or legal support in the I2P community to reliably support outproxies even though I2P already has full support for it.

I2P is a fantastic tool for private communication across the Internet and the true ELI5 here is I2P natively supports "anonymous" torrenting (even encouraged it as it strengthens the network further) and will do so privately and securely without any need for a VPN. Adding support to QBittorrent makes it even easier to access I2P torrenting with very minimal set up required.

The only catch here is you can't go around downloading any old torrent from the Internet on I2P, someone needs to actually be seeding that torrent on the I2P network for you to get any data. There are fully functioning tracker sites exclusively within I2P that have a huge catalog of content but all is not lost for "clearnet" torrents either. Software like BiglyBT and now QBittorrent, allows users to "bridge" or "cross seed" torrents across the two networks, that way content is shared no matter what network you're a part of.

BiglyBT has been doing this for a while now but I'm so happy to see QBittorrent finally embracing this as well.

EDIT: https://geti2p.net/en/

[–] Agent641@lemmy.world 3 points 10 months ago (2 children)

How are nodes chosen by the client?

What stops governments/LEO/copyright dragons from spinning up thousands of the fastest/most accessable i2p nodes so that clients connect to them first, then these hosts log the traffic paths to identify origin/destination?

[–] Strict3443@lemmy.ml 3 points 10 months ago

https://geti2p.net/en/docs/how/threat-model#sybil

Good write-up from the I2P team on this topic. Page includes other attack vectors as well.

load more comments (1 replies)
load more comments (33 replies)
load more comments (42 replies)