this post was submitted on 01 Oct 2023
112 points (95.2% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
54788 readers
802 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I that case, why not help spread a little freedom in the rest of the world by hosting an I2P node?
We should make torrenting over I2P the default.
Any dissidents in places like China who are caught using it could then plausibly claim they were just downloading a movie.
I seed around 5Tb monthly but that sounds interesting
isnt hosting a node a very easy way to get the police knocking on your door? i dont want csam flowing through my network
All traffic over I2P is encrypted unless you use an outproxy (which isn't as common as a Tor exit node is), so no. Most, if not all I2P torrenting traffic never touches an outproxy, just like Tor hidden services (.onion sites and whatnot) never touch an exit node.
Hosting a Tor relay is fine even, as you are still just passing encrypted data around. It's running an exit node that can get you into some sketchy waters with your ISP/law enforcement.
Who is running the exit nodes then? 3 letters agencies?
Yeah in some cases, and in other cases it's still just volunteers with really good lawyers.
And even then, there's still no definitive link from the exit node back to the guard (entry) node/relay. And, if you're actually trying to be anonymous from 3 letter agencies, you wouldn't be messing with the clearnet (and therefore exit nodes) through Tor to begin with. You'd probably be sticking to Tor hidden services.
If this was the first time the world heard of onion routing, then yes.
Now they can realize that you're probably just one step in the chain. And with i2p there's no way to know if they even reached the end of the chain (provided you host i2p for long enough).
You really think that would stick? Just a couple days ago there was a news article of a guy getting sued for using a VPN for remote work