• noodles@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    29
    arrow-down
    3
    ·
    edit-2
    6 days ago

    You can’t connect to peers outside the i2p network And i personally haven’t found any active torrenting community for i2p So yeah i2p is really cool, but i don’t think you can pirate over it just yet

    • Most Auspicious@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      8
      ·
      6 days ago

      Postman has a quite active community, you can find a lot of stuff there already. It’s not quite on the level of clearnet torrenting yet, of course, but it can very much stand on its own

    • just_an_average_joe@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      6
      ·
      6 days ago

      Does p2p over i2p require port forwarding? I have a cheap vpn (surfshark) that does not have port forwarding and i am almost never able to seed over it. Will seeding over i2p require port forwarding?

      • Most Auspicious@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        5
        ·
        6 days ago

        It functions without port forwarding, but it’s much better with. While I can’t speak for the Java client, i2pd has support for UPnP, which might make things easier in some environments. You also don’t need a VPN for I2P, since the network takes care of the anonymising

      • sploodged@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        6 days ago

        it’s generally advisable to not run a vpn in front of i2p. it will run better without one and you introduce another point of failure that can reduce your anonymity in some circumstances.

      • Brickfrog@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        6 days ago

        Does p2p over i2p require port forwarding?

        No, you’ll torrent fine via I2P without port forwarding. Note that the torrents are running through the I2P network so technically you wouldn’t want to open your torrent client to the clearnet anyway. It’d be like purposely introducing a VPN leak in your VPN setup by allowing it traffic outside the VPN (or in this case I2P).

        Been a bit since I’ve tinkered with torrents over I2P but for a while I was seeding torrents over I2P and would get pretty good seed/upload speeds to other torrent peers. Was mainly testing with i2psnark and BiglyBT.

        Fun fact: Torrent hashes don’t change, so that same exact torrent you might download at TPB or wherever would still download within I2P as long as there’s someone seeding it there.

        Also see https://geti2p.net/en/faq#ports

        Not exactly what you’re asking but you can open a port forward for I2P itself to better communicate with other I2P routers. “routers” in this case usually means other people running I2P.

    • sploodged@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      5
      ·
      6 days ago

      we’re trying, also some clients will let you do that. snark and XD are i2p only, qbittorrent and bigly bt will let you pull peers from clearnet and i2p if they’ve been cross-seeded

        • sploodged@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          3
          ·
          6 days ago

          you can use a vpn for clearnet like normal along with i2p,ideally i2p not through the vpn though. it’s a good way to cross-seed stuff into i2p though (you can do this as you’re downloading from clearnet peers) and every now and again might find some random i2p seed holdout on a “rare” torrent.

    • arisunz@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      6 days ago

      postman tracker was already shared somewhere around here, i recommend checking that out

      ofc it’s nowhere near the level of clearnet but i’ve had good luck finding technical books as a test

      download speed was pretty abysmal when i tried it a few years ago though so i didnt bother with anything bigger than 1 gb or so (took a few days to download a sizable book compilation)

  • earmuff@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    2
    ·
    7 days ago

    If someone is actually trying to convict you just based on the correlation of the connection times, you probably don’t just share a copyrighted movie. So why mentioning this as an actual threat in the first place?

      • earmuff@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        2
        ·
        6 days ago

        Is this the only point, when it comes to security? In my experience, the ease of use is also a factor. Today, VPN clients are just one button and it runs. I2P is almost there, but requires you to setup some configs manually. So is it really worth to drive a tank to just go grocery shopping?

        • dwindling7373@feddit.it
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          1
          ·
          6 days ago

          It is not the only point when it comes to adopting technologies, when it comes to maximizing privacy, yes maximizing privacy is tautologically the only point.

    • didnt1able@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      9
      ·
      6 days ago

      There’s nothing saying that tomorrow this isn’t the case. Laws are fluid, just because they won’t come after people currently for small time piracy does not mean that won’t change.

      • earmuff@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        edit-2
        6 days ago

        Tomorrow passwords will be cracked in no time, because most algorithms are not quantum safe. Same with password length.

        I never said it is not an attack vector. There are dozens if not hundreds. The question is about the probability, which is always a dimension if you manage risks. There is no need to list all theoretical possible attack vectors, if the probability of actually happening only affects 2 people on this planet.

        Videos for educational purposes should not sensationalize unlikely attacks, as it only causes unnecessary fear. I’d rather have someone using torrent on VPN than not using anything at all because they are now afraid of the government.

  • Trincapinones@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    4
    ·
    6 days ago

    Are the red caps just a coincidence? Because lately, the more videos I see of him, the more conservative he seems to me

    • arisunz@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      32
      arrow-down
      3
      ·
      edit-2
      6 days ago

      i mean the dude does end up uploading a torrent of a jordan p*terson video as an example so that’s pretty sus, at the very least

      • Confetti Camouflage@pawb.social
        link
        fedilink
        English
        arrow-up
        8
        ·
        edit-2
        6 days ago

        His actual computer related stuff has good advice in it but a lot surrounding that advice is indeed pretty sus or extrapolates to clownish end analysis. Like Ford patenting a speeding snitcher to put in their cars that reports other nearby speeding vehicles to the police is going to lead to the end of non-autonomous driving. I wonder if “car dependency” means anything to him. Just engage with it critically.

        • arisunz@lemmy.blahaj.zone
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          edit-2
          4 days ago

          “just engage with him critically”

          how about i just follow better channels instead lmao