• Prunebutt@slrpnk.net
    link
    fedilink
    arrow-up
    28
    arrow-down
    2
    ·
    3 months ago

    I wish more people would try out I2P as a result. AFAIK, garlic routing makes this kind of attack impossible.

              • MigratingtoLemmy@lemmy.world
                link
                fedilink
                English
                arrow-up
                2
                ·
                3 months ago

                Use OpenVPN configured to look like HTTPS if you really need it. I2P is meant to be its own network, not a gateway to the clearnet. I still do not see how it has less measures in place for privacy and anonymity.

                • Possibly linux@lemmy.zip
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  3 months ago

                  OpenVPN does not provide Onion routing and is not the same thing. You are comparing apples and oranges. Tor is well proven and battle tested. It also has the benefit of being well known and easy to use.

                  • MigratingtoLemmy@lemmy.world
                    link
                    fedilink
                    English
                    arrow-up
                    1
                    ·
                    3 months ago

                    OpenVPN -> I2P.

                    I2P has been around for 20 years, it is plenty battle-tested. I do not see why you’re wanting to put down I2P in favor of TOR, I still do not see how I2P is in anyway inferior in its privacy (and for the most part, anonymity) features compared to TOR. The OpenVPN addition solves your need for something akin to snowflake/TOR bridges. It is not what I2P was meant for but there’s a way if you want to use it.

                    If your complaint is about I2P needing some configuration and time to use properly; that’s a trade-off the end-user needs to decide. This doesn’t have any effect on its features regarding anonymity in the I2P network. Please give me technical reasons why you think TOR can preserve your anonymity better on the TOR network than I2P can do so on its network (I have arguments in favor of I2P that I would like TOR to implement but I don’t think they can)

    • HelixDab2@lemm.ee
      link
      fedilink
      arrow-up
      1
      ·
      3 months ago

      I’ve tried to use it, but have not managed to get it to work. Which is a bummer.

      I should probably try again now that I have a new computer. My old computer was so old that a lot of stuff wasn’t working correctly.

      • Prunebutt@slrpnk.net
        link
        fedilink
        arrow-up
        4
        ·
        3 months ago

        Remember that you need to let the server run for a bit, so it can establish , the routes.

        I have a service constantly running on my server. When I want to browse, I tunnel the ports to my laptop.