this post was submitted on 01 Oct 2023
113 points (95.2% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
55056 readers
195 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
isnt hosting a node a very easy way to get the police knocking on your door? i dont want csam flowing through my network
All traffic over I2P is encrypted unless you use an outproxy (which isn't as common as a Tor exit node is), so no. Most, if not all I2P torrenting traffic never touches an outproxy, just like Tor hidden services (.onion sites and whatnot) never touch an exit node.
Hosting a Tor relay is fine even, as you are still just passing encrypted data around. It's running an exit node that can get you into some sketchy waters with your ISP/law enforcement.
Who is running the exit nodes then? 3 letters agencies?
Yeah in some cases, and in other cases it's still just volunteers with really good lawyers.
And even then, there's still no definitive link from the exit node back to the guard (entry) node/relay. And, if you're actually trying to be anonymous from 3 letter agencies, you wouldn't be messing with the clearnet (and therefore exit nodes) through Tor to begin with. You'd probably be sticking to Tor hidden services.
If this was the first time the world heard of onion routing, then yes.
Now they can realize that you're probably just one step in the chain. And with i2p there's no way to know if they even reached the end of the chain (provided you host i2p for long enough).