It doesn't avoid sending out your IP address per se- it has to, in order to
allow the reply to be sent to you- but 'anonymizes' it through two
techniques. Firstly, the tunnels serve to introduce distance between the
sender and the receiver of a packet, preventing a single user from watching
How does I2P avoid sending your IP address?
Thank you.
>whistle blowers, journalists, political dissidents, etc.
I think they could use an anonymous torrent service too.
>Torrenting via Tor is NOT anonymous.
What I have read too. Can you tell why tor does not make the torrent system
anonymous.
I read it was about the torrent client
Thank you.
>whistle blowers, journalists, political dissidents, etc.
I think they could use an anonymous torrent service too.
>Torrenting via Tor is NOT anonymous.
What I have read too. Can you tell why tor does not make the torrent system
anonymous.
I read it was about the torrent client
The reason I2P is more safe and ethical than Tor for torrenting is the fact
that it was built for that purpose- unlike Tor, which is primarily designed
for standard client/server systems (with clearnet access being part of the
system, unlike for I2P). They do share parts of their
So is the use of encryption what makes it safer than Tor for torrenting? To a
layman the "tunnels" sound very similar to relay nodes.
I'll take a look at GNUnet too. Thanks.
What does IP2 do differently that makes it safe?
Torrenting via Tor is NOT anonymous. Torrenting with a VPN is not anonymous.
Torrenting with I2P is absolutely anonymous and very very safe.
https://geti2p.net/en/
Expect slowly slow slowness though :///
https://www.tribler.org/
Why is making anonymous torrent systems difficult?
I suppose it is difficult, because tribler has been developed for some time
and not gotten there.
My understanding is, tribler has made there own sharing system, like
https://geti2p.net/en/. Are both software