• Banthex@feddit.de
    link
    fedilink
    English
    arrow-up
    0
    ·
    10 months ago

    I Like the Idea top Setup Retroshare with I2P. Die people have any experience there?

    • OsrsNeedsF2P@lemmy.ml
      link
      fedilink
      English
      arrow-up
      0
      ·
      10 months ago

      Probably not. I2P doesn’t connect to the clearnet like Tor does, it only works if the destination is on I2P as well.

      • sir_reginald@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        10 months ago

        I2P does connect to the clearnet, it just doesn’t by default.

        Outproxies are available and you can even host your own routing it through Tor. That way you get the best of both networks.

    • ReversalHatchery@beehaw.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      10 months ago

      It requires running additional software, a so called “I2P router”.
      This can be ran on Linux and Windows systems too, on localhost or for your local network.

  • zjaume@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    10 months ago

    Is a torrent client behind i2p as reachable as if I had a VPN with port forwarding?

    EDIT: is the use of i2p compatible with private trackers? So that they can keep track of what I’m seeding?

    • zjaume@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      10 months ago

      I think I’m answering myself as I just read i2p is closed from clearnet. So I suppose the private tracker would need to be connected to i2p.

      • Natanael@slrpnk.net
        link
        fedilink
        English
        arrow-up
        0
        ·
        10 months ago

        Yup, unless you specifically set it to use one of the few outproxies then it’s by default just for connecting to other peers within the I2P network

    • RyeMan@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      10 months ago

      Others have summarized it well but I’ll add my perspective also.

      I2P is a decentralized network of peers. All traffic gets routed through multiple peers before reaching its destination. Traffic is also encrypted by multiple layers of encryption and each connected peer can only decrypt one layer, that layer will only contain further routing info so that peer knows the next place to hand off your data. The encryption gets stripped layer by layer until it finally reaches its destination.

      What this ultimately means is that by interacting with a website or service through I2P it is virtually impossible to identify any information the user is sending or receiving and it is also impossible to tell where the connections are going or coming from.

      To make things even more interesting all I2P routers by default also contribute resources back into the network so while your I2P Router is handling your communication connections, it’s also volunteering to be a connection node in someone else’s connection. This adds further security because now you’ve got many Peer to Peer connections going in and out of your network, all encrypted so any prying eyes will have an exceedingly difficult time trying to make sense of any of your internet traffic.

      Tor relies on the good faith of its community to contribute resources to the network and it’s not very well incentivised causing its resources to be far more limited and bogged down. For this reason, Tor cannot sustain heavy torrent traffic without easily being overwhelmed. In I2P, every user is a contributor so the more people who use I2P, the faster and better it becomes.

      The big advantage Tor has over I2P are outproxies and the beautifully prepacked Tor Browser. Tor has a lot more influence and money backing it so there are some large and well protected entities that can afford all the legal trouble that outproxies can bring. Unfortunately there just isn’t enough money or legal support in the I2P community to reliably support outproxies even though I2P already has full support for it.

      I2P is a fantastic tool for private communication across the Internet and the true ELI5 here is I2P natively supports “anonymous” torrenting (even encouraged it as it strengthens the network further) and will do so privately and securely without any need for a VPN. Adding support to QBittorrent makes it even easier to access I2P torrenting with very minimal set up required.

      The only catch here is you can’t go around downloading any old torrent from the Internet on I2P, someone needs to actually be seeding that torrent on the I2P network for you to get any data. There are fully functioning tracker sites exclusively within I2P that have a huge catalog of content but all is not lost for “clearnet” torrents either. Software like BiglyBT and now QBittorrent, allows users to “bridge” or “cross seed” torrents across the two networks, that way content is shared no matter what network you’re a part of.

      BiglyBT has been doing this for a while now but I’m so happy to see QBittorrent finally embracing this as well.

      EDIT: https://geti2p.net/en/

      • lemmyingly@lemm.ee
        link
        fedilink
        English
        arrow-up
        0
        ·
        10 months ago

        To summarise, I2P is similar to Tor, except that every client also serves as a node, and there are no exit nodes, so you can only access data shared by other I2P clients

        Is my summary correct?

    • OsrsNeedsF2P@lemmy.ml
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      10 months ago

      It’s a dark network. Instead of going to a website, you go to an “eepsite”, and to get there you securely route through a bunch of random computers (as if you went through 10+ VPNs). It’s similar to Tor, but the main difference Tor’s primary goal is to visit websites (on Tor, “onion sites” exist, but unlike I2P, “onion sites” are not the primary focus of Tor).

    • dmonzel@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      10 months ago

      From the article that was posted:

      The main new feature is support for I2P, the Invisble Internet Project. It uses a fully encrypted privacy network layer to hide user activity and locations. The network does not use servers. Peers contributed “a portion of their resources” to other network particpants.

      The maintainers promise that “non one can see where traffic is coming from, where it is going, or what the contents are” when the Invisible Internet Project is active.

    • EinatYahav@lemmy.today
      link
      fedilink
      English
      arrow-up
      0
      ·
      6 months ago

      the tor onion network. But no exits to clearnet.

      Everybody contributes bandwith. And because everybody contributes bandwith, privacy is created because you can never know if you reached the end of the chain and found the creator of the first network request.

      In theory it’s a lot more secure than the tor network. In practice it gets 1/100th of the funding, because you have to be a computer nerd to even install it, need a computer to keep it running 24/7 (longer you run, more privacy) , while tor browser “Just works” and can start providing privacy to everybody right away.

  • arisunz@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    10 months ago

    Some documentation would be nice.

    I’ve been trying to connect qbittorrent to my local i2pd node for the last 30 minutes and for the life of me I cannot get it to work, even though other services work via SAM in the same port. Everything just times out.

    • Strict3443@lemmy.ml
      link
      fedilink
      English
      arrow-up
      0
      ·
      10 months ago

      It is experimental indeed. While it “works”, it is no where near the reliability and efficiency of other I2P torrent clients like I2Psnark or BiglyBT, both of which are Java based.