this post was submitted on 16 Jun 2023
174 points (91.8% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54577 readers
237 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

After the Mullvad fiasco I decided to stop using VPNs all together, since port forwarding is always going to be a problem on all of them, if you read the reasons why Mullvad had to shut down that service.

There is a better way using i2p which conceals your IP and makes it impossible for anyone to know what or if you're downloading at all! No DMCA notices, no problem.

I wrote this small guide to another comment and figured I'd share it in its own post since I'm seeing so many people ask for VPN recommendations.

So there are 2 main implementations of i2p. First is the main Dev’s Java client here https://geti2p.net/en/download

The other is i2pd, which is C++.

I use the Java one personally but both would work. Someone posted back on reddit a guide on /r/i2p for qbittorrent, which is what I use now for this too. The guide was shared as a public torrent you can download with this info hash: 3f1d51095f9b116739172c1bced149acf2b10692

Use that hash with any of the various public trackers and you should be able to download that guide.

But if you just want a basic setup, that Java client comes with i2psnark, which is a Bittorrent client already setup.

The only other thing you want to do is go and search the biggest tracker for stuff, which is called PaTracker, Postman’s tracker. http://tracker2.postman.i2p, only accessible from i2p itself, which you’ll need to have setup and running first to view.

This tracker needs more seeders and uploaders in general, and by improving those things service for everyone is better. So the more the merrier.

Thanks! Feel free to ask any questions, there also might be other people who use i2p now for torrenting. I'm sure they'll help too.

you are viewing a single comment's thread
view the rest of the comments
[–] lodion@aussie.zone 9 points 1 year ago (2 children)

Doesn't this make every user the equivalent of a Tor exit node? Meaning you'll have possibly dodgy traffic appearing to come from your internet service?

[–] karce@wizanons.dev 17 points 1 year ago* (last edited 1 year ago) (2 children)

No. I2P works differently than Tor. There are no exit nodes, because there are no exits. I2P is separate from all clearnet traffic. For example, you cannot browse reddit.com from within i2p, like you can with tor.

[–] lodion@aussie.zone 7 points 1 year ago (1 children)

Gotcha. So its basically a large, decentralized overlay network...ie you can't use it to "privately" access clearnet content as you can with a VPN. Sounds like the headline is misleading.

[–] karce@wizanons.dev 7 points 1 year ago* (last edited 1 year ago)

That's exactly correct, yes. A VPN is still useful for accessing clearnet websites that you want to conceal from your ISP. I'm arguing that you don't need to go to clearnet websites for most of the stuff you download from public trackers. private trackers are always going to have great quality releases, but I could see them moving over to i2p at some point as well. Though DMCA shouldn't be much of a concern for private trackers anyway.

[–] LoafyLemon@kbin.social 5 points 1 year ago (1 children)

It's a entirely different protocol then? That's smart actually. I need to look into it.

[–] karce@wizanons.dev 6 points 1 year ago

Completely different protocol, yep. Has nothing to do with Tor really. The only similarity is that both are 'darknets'

[–] Dienervent@kbin.social 1 points 1 year ago

Seems like i2p has its own version of exit nodes. So if you're not configured as an exit node you should be in the clear as all communications are end to end encrypted, so it would be difficult to impossible to determine what is passing through you as an intermediate node.