Care about #privacy? Take a look at #i2p - a mature #FOSS network project offering "Privacy-By-Design".

πŸŽ‰ The @i2p team just released a few minutes ago v2.37.0 - again: great effort πŸ”₯ πŸ™ .

Ready-to-use #docker container here (also a version including #tor and #i2p): hub.docker.com/r/divax/i2p

Entry-level, "how to", blog post here: diva.exchange/en/privacy/intro

Latest video (1 slide covering I2P): odysee.com/@diva.exchange:d/fo

Follow

@konrad @i2p I'm not so sure i2p is private: can't you look up a hash in the dht and get IPs back? If I had to post something sensitive I'd post to an image board from TOR before i2p.

Β· Β· 1 Β· 0 Β· 0

@swiley @i2p IMHO the anonymity of senders and recipients (using the default routing setup) has not been compromised on the network of I2P.

The anonymity of Tor users has been compromised by corrupt exit nodes. This is just my opinion - I would need to lookup the academic research to get into detail. The website of I2P lists the academic work and you might find answers there. πŸ˜πŸ‘ There is also subreddit about I2P which gets actively maintained.

@konrad @i2p corrupt exit nodes are only an issue if the site doesn't have a hidden service.

Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.