/I2P vs TOR/ Contemporary Anonymity - /g/ (#105805032) [Archived: 626 hours ago]

Anonymous
7/5/2025, 5:31:53 AM No.105805032
i2p
i2p
md5: de8401042b8768fc744fe305e7dc39dd🔍
redpill me on why I should use i2p instead of tor and why?
Replies: >>105805375 >>105805386 >>105806112 >>105809782
Anonymous
7/5/2025, 6:03:28 AM No.105805220
i cant connect to i2p and get worse than dialup speeds so its worthless
Replies: >>105805292 >>105805375
Anonymous
7/5/2025, 6:19:56 AM No.105805292
>>105805220
Nigga you Li3! Show proof.
Anonymous
7/5/2025, 6:42:15 AM No.105805375
>>105805032 (OP)
I2P is a full package with a bunch of different services from mail to torrenting to hosting your own web server. Thats what I like the most about it, its like an all-in-1 alternative to the modern internet, and its kino. Most websites are wholesome, its great for file sharing, and if youre too broke to have your own email or web site just run I2P.
>>105805220
Raise the upload and download bandwidth.
Replies: >>105805446
Anonymous
7/5/2025, 6:44:11 AM No.105805386
>>105805032 (OP)
the only real anonymity method is being rich as fuck and buying your own isp
Anonymous
7/5/2025, 6:55:35 AM No.105805446
>>105805375
Danke

Got any specific tips for efficiency?
Replies: >>105805529
Anonymous
7/5/2025, 7:10:38 AM No.105805529
>>105805446
Weirdly enough I have a lot of bandwidth so I share a lot. My share ratio is an insane number according to the router and somehow that makes it more efficient at loading websites, maybe just because then I could raise the download bandwidth, but its still a good bit lower than what I share
Anonymous
7/5/2025, 9:00:51 AM No.105806112
>>105805032 (OP)
By being P2P it is more sound structurally. Let's say there were 999 nodes, 333 entry, middle and exit. That would require 999 volunteers and the biggest legal risk is on the ones running exit nodes. If the entry and exit nodes got compromised, the attacker could easily get your real IP and link it to some behavior. So this means that the network could both be easily attacked with timing attacks and exhausted if significantly more than 1k people use it.
By being P2P I2P solves this problem since any user is a node, eradicating the legal risk for some users, making it harder for malicious actors to enter and making the network more robust. Some countries like Switzerland even have legal protections against the feds listening in on P2P connections so that could help.
The I2P site has a fair comparison against Tor stating in which ways either service is lacking what the other has.
Anonymous
7/5/2025, 9:30:07 AM No.105806222
do anything fun on i2p?
Replies: >>105806304 >>105806570 >>105808124
Anonymous
7/5/2025, 9:43:35 AM No.105806304
>>105806222
I2P got more of an old internet vibe so most sites you will find are pretty small, often in russian. Also a lot of torrent trackers.
Anonymous
7/5/2025, 10:38:35 AM No.105806570
>>105806222
Torrent your shit without LE knowing what you download
Anonymous
7/5/2025, 3:36:46 PM No.105808124
>>105806222
You can play games
There was a time that there was literally a Minetest server on there
Anonymous
7/5/2025, 4:02:53 PM No.105808280
Tor is NOT anonymous.
BGP (Border Gateway Protocol). RKPI is beyond insufficient and totally undeveloped to stop BGP. Tor is simply NOT anonyous. With counter-RAPTOR
counter-Routing Attacks Privacy TOR there's no way for Tor to be anonymous.
for those interested in BGP and understanding how it works (understanding how the internet works), this fundamental flaw basically destroys TOR's anonymity. When you launch Tor, you connect to what you think is a guard relay in Germany, let's say. But an attacker—(government/state) announces fake BGP routes, claiming they own that German server's IP address and your internet service provider believes the fake announcement. Your traffic gets redirected to and thru government/state servers instead of the real Tor relay that exists. The attacker sees your real IP address before forwarding your traffic to the actual Tor relay. Your anonymity dies instantly with that.
Anonymous
7/5/2025, 4:10:17 PM No.105808321
BGP Border Gateway Protocol IS THE REAL INTERNET. IT IS WHERE GLOWNIGGERS SIT AND SEE EVERYTHING.

NSA fags feel free to comment on this
Replies: >>105809812
Anonymous
7/5/2025, 7:36:42 PM No.105809782
images
images
md5: aa7ecffd004c5165941965be4640f5d2🔍
>>105805032 (OP)
>Babe, its time to switch to this new truly anonymous network
Yes, honey.
Replies: >>105809821 >>105809887
Anonymous
7/5/2025, 7:41:24 PM No.105809812
>>105808321
That’s a routing protocol it doesn’t pass traffic natively you dingus. You should specify bgp poisoning to then pass traffic their routers. Learn how networking works before you try and look smart
Replies: >>105809834 >>105809848
Anonymous
7/5/2025, 7:42:45 PM No.105809821
critical semitic theory
critical semitic theory
md5: d0912df7095c19b95321f589e8a06537🔍
>>105809782
i2p looking hella comfy, i just love the p2p structure/mentality; sharing is caring as they say and lets not pretend the clear web isnt dead.
Anonymous
7/5/2025, 7:44:51 PM No.105809834
>>105809812
>I don't understand how the internet works
kek that'll be you
BGP redirects traffic BEFORE it reaches the TOR network. lel

EVERYTHING APPEARS NORMAL FROM YOUR PERSPECTIVE

Remember, the GOVERNMENT/CIA INVENTED THE INTERNET TO SPY ON ADVERSARIES AND YOU ARE AN ADVERSARY

Your ISP is given an IP and service by the maintainers and controllers of the internet — VERIZON AT&T and others. Essentially CIA/DARPA/NSA

How many of you retards actually vet your ISPs for security and privacy; to find out if any of them use RPKI on their networks and nodes? 0
Were you to do so, you'll come to understand that your ISPs are OWNED by the backbone internet providers. Still, this is somewhat separate from TOR, where your traffic is controlled and routed to nodes that DO NOT implement RPKI and guess what? THE PRIVACY AND SECURITY ARE REGION SPECIFIC!!!

YOU KNOW-NOTHING, FAGGOT.
YOU KNOW NOTHING, FAGGOT.
Replies: >>105811965
Anonymous
7/5/2025, 7:46:45 PM No.105809848
>>105809812
The internet is simply NOT ANONYMOUS
BGP routes intercept and hijack traffic. it basically IS the internet protocol and is NOT anonymous. ALL traffic, including TOR traffic runs through BGP. END OF STORY

ISPs ASNs are owned by glowniggers. glowniggers sit at the top and have a bird's eye view of the ENTIRE topology and can see EVERYTHING. BGP interceptions and hijacks are built into the entire internet. Autonymous systems host TOR relays.
An autonymous system is a network controlled by an organization, like your ISP, for example, or a TOR hosting company. each autonymous system gets assigned a unique number called an ASN, for example, Comcast is AS7922 and google is AS15169.
When you connect to the internet, your traffic travels through multiple autonymous systems to reach its actual destination.
Many of these networks have pretty terrible resilience against BGP hijacking and interception.
Anonymous
7/5/2025, 7:51:12 PM No.105809887
>>105809782
Isn't i2p old as fuck?
I remember reading about it when I was a teen nearly 20 years ago.
Either that or I'm hallucinating, that's possible too.
Anonymous
7/5/2025, 10:09:22 PM No.105811118
I would like to know your opinion:

Let's assume that Tor allows you to hide from the corpos (Google, Meta etc.), but not from the glowies. So, the glowies will still know your browsing history. The corpos are obliged to share user data with the glowies, but the glowies don't share user data with the corpos. So, if you just want to hide your browsing from the corpos, Tor Browser is still the best option to preserve your privacy in every day browsing (or at least passive reading).

Tl;dr: You CAN hide from the corpos, but you CAN'T hide from the glowies. It is not a full win, but better than nothing.
Anonymous
7/6/2025, 12:12:57 AM No.105811965
>>105809834
>schiz ramble with no links to back up his claims
so standard divide & conquer tactics officer? or prehaps well poisoning?