2
submitted 1 month ago by CAVOK@lemmy.world to c/i2p@lemmy.world
top 5 comments
sorted by: hot top controversial new old
[-] silverpill@mitra.social 0 points 1 month ago

I think this article is generated by AI.
Fake CVE numbers. For example, "critical vulnerability (CVE-2021-34527) revealed that Tor Browser leaked real IPs under certain configurations", but if you look it up, it is about Windows Print Spooler.
I2P sites also look fake.
The debian package is called i2pd, not purplei2p

[-] xwyqi@mitra.xwyqi.org 1 points 1 month ago

@silverpill >Developers in China use it to distribute tools and circumvent the Great Firewall.

Tbh, Chinese developers typically use shadowsocks or vmess protocol proxies; they do not use i2p. Futhermore, no one in China knows about i2p, even though its usability is better than Tor.

[-] shortwavesurfer@lemmy.zip 0 points 1 month ago* (last edited 1 month ago)

This is a very good write-up. I have found I2P to be rather slow when I've tried to play with it, and I don't know if that's a misconfiguration on my part, or if I2P would benefit from something like the proof-of-work defenses that Tor has implemented, which have made hidden services work much more reliably. I'm obviously aware that any overlay network is going to be slower than the main internet. But, at least on my system, I found I2P to be even slower than Tor, which I was not expecting.

Also, I would consider myself to be a fairly technical user, and I2P even seems a bit daunting for me. I think one thing that makes Tor so well used is the fact that Tor browser exists where it's already pre-configured to just work as soon as you open it. I currently even host my Monero node as a Tor hidden service with the proof of work defenses enabled and a couple of other hidden onion services for my home assistant setup.

Edit: With even supposedly democratic Western governments beginning to censor the internet, I am thinking very seriously that at some point it may be required to use Tor and I2P to actually access useful information on the internet and that there will be a bifurcation of the internet into those who know and those who don't.

Currently i use my podcast app (AntennaPod), F-Droid, several Monero wallets, Molly (signal fork), and SimpleX all over the tor SOCKS5. I don't have any reason to do so except to generate cover traffic for those who are using it for more necessary purposes and to understand how the networks operate as far as bandwidth, etc., are concerned.

Every time it is possible to access anything as a hidden service, I will do so. I have my F-Droid repos, for example, using their hidden service equivalents instead of the clearnet ones. Just because I can. And I love having F-Droid repositories that are hidden services only.

Edit 2: It took me 31 minutes to pull 51 megabytes of data to synchronize my Monero wallet over an i2p hs. An onion tor hs would have had that done several times over in that time

[-] degen@midwest.social 0 points 1 month ago

I haven't looked at the article yet and only superficially poked around with I2P, but I think the idea is that user adoption is the key to better speeds and reliability given the P2P nature. That said, I found it to be daunting as well just getting into it.

Privacy and security in general are like that for me because a lot of the pitfalls come with how you use the tech and not just the structures they provide.

[-] sobchak@programming.dev 1 points 1 month ago

I think 300KB/s is around the max possible in the current implementation:

Encryption, latency, and how a tunnel is built makes it quite expensive in CPU time to build a tunnel. This is why a destination is only allowed to have a maximum of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available). Used tunnels are discarded every 10 minutes and new ones are built. This change of tunnels, and sometimes clients that shutdown or lose their connection to the network will sometimes break tunnels and connections. An example of this can be seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget.

https://geti2p.net/en/about/performance

this post was submitted on 18 Aug 2025
2 points (75.0% liked)

The Invisible Internet Project

1787 readers
1 users here now

I2P Community Edition

This isn't the official I2P channel, if you want go there then you can find it in the links below.

Rules

"Don't be a dick" - Wil Wheaton

General

Media:

File Hosting and Pastebins

Torrents

Social Networks and Microblogging

Exploring I2P

I2P Name Registries

Search engines

IRC

Irc2P comes pre-configured with I2P. To connect with other networks, please follow this tutorial.

Syndie

An open source system for operating distributed forums in anonymous networks

Inproxies

You can use inproxies to surf the I2P network without having to have an I2P router.

Follow us on Twitter

founded 2 years ago
MODERATORS