- cross-posted to:
- piracy@lemmy.dbzer0.com
- cross-posted to:
- piracy@lemmy.dbzer0.com
cross-posted from: https://lemmy.dbzer0.com/post/638840
I found I2P much better than Tor network, and now it supports BitTorrent protocol too https://geti2p.net/en/docs/applications/bittorrent .
Why haven’t the pirates migrated to I2P? Why are we still using clearnet and making people backout of seeding cause of DMCA?
Because it’s slower than using VPN + clearnet?
Do be honest I don’t care about speed when it’s free. I just start the download and enjoy it a few days later
The selection of torrents on i2p is also a lot smaller than on the clearweb.
I might work on this later. I’m a developer specialized in p2p technologies. I’m currently working on a decentralized search engine for ipfs but after that I would like to build a torrent client that supports clearnet and i2p at the same time, and also supports decentralized search of torrents
As a user: There needs to be absolute certainty that clearnet is disabled when I want it to and no way to leak the IP. Kinda like how i know setting mullvad as the internet adapter should mean client traffic only ever goes over that connection.
I agree. I leaked my ip because of shitty software in the past
BiglyBT let’s you so that
I think biglybt already does this?
Thanks I will look into that. I’m not sure yet if that’s exactly what I want, I don’t only want the client to support downloading from multiple networks, I also want the client to provide the torrent on all available networks, working as a bridge between them
The qBittorrent 4.6.0 alpha/beta adds support for i2p torrents. There is also a checkbox to enable “Mixed Mode” where the torrent will download through i2p and the clearnet at the same time. Sounds similar to what you are describing.
That requires that you trust your vpn.
As opposed to trusting I2P?
You don’t have to. You can audit the code yourself and build it from scratch. Most won’t. But you can.
Only works if you code. For the 99% of us that don’t, open source means little in that regard.
True, but you can. For vpn you have to trust them. There is no other choice.
If you can’t read code yourself you can pay a number of companies some money to do the audit for you. Or you can learn to code.
You can’t learn to know how the vpn logs data.
But I get you. Most of us just put our trust in another entity.
The trust model is totally different.
With a VPN you know the VPN dudes can compromise your security and you have to trust the specific guys hosting your VPN and also trust their OpSec. The failure mode is quite realistic.
With I2P, and Tor you can trust that anyone in the world can audit the code. Including the highly knowledgeable people who know this stuff.
The failure mode is very low and in reality depends on highly complex zero day vulnerabilities that can only be effectively exploited by a few nation-states, if they actually even have one.
That said, a VPN is lower hassle and probably good enough for most purposes.