@konrad@i2p I'm not so sure i2p is private: can't you look up a hash in the dht and get IPs back? If I had to post something sensitive I'd post to an image board from TOR before i2p.
@swiley@i2p IMHO the anonymity of senders and recipients (using the default routing setup) has not been compromised on the network of I2P.
The anonymity of Tor users has been compromised by corrupt exit nodes. This is just my opinion - I would need to lookup the academic research to get into detail. The website of I2P lists the academic work and you might find answers there. ππ There is also subreddit about I2P which gets actively maintained.
@swiley @i2p IMHO the anonymity of senders and recipients (using the default routing setup) has not been compromised on the network of I2P.
The anonymity of Tor users has been compromised by corrupt exit nodes. This is just my opinion - I would need to lookup the academic research to get into detail. The website of I2P lists the academic work and you might find answers there. ππ There is also subreddit about I2P which gets actively maintained.