this post was submitted on 01 Feb 2025
459 points (99.1% liked)
linuxmemes
23677 readers
2248 users here now
Hint: :q!
Sister communities:
Community rules (click to expand)
1. Follow the site-wide rules
- Instance-wide TOS: https://legal.lemmy.world/tos/
- Lemmy code of conduct: https://join-lemmy.org/docs/code_of_conduct.html
2. Be civil
3. Post Linux-related content
sudo
in Windows.4. No recent reposts
5. π¬π§ Language/ΡΠ·ΡΠΊ/Sprache
6. (NEW!) Regarding public figures
We all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations.Please report posts and comments that break these rules!
Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
So, if I recall correctly, I had to set up a device as an i2p server (seems like they were super light weight and you could configure your phone to do it) and then you could use your browser of choice with the "i2p server" as a proxy.
Its my understanding that each of the "i2p servers" acted as both an entry point and an exit point. That is to say, while my traffic entered the network there, there were other people's traffic that could be routed through and/or exit via my server.
Am I wrong on that assessment?
Yep, almost. Every* i2p node also acts as a relay, which not only helps the network, but also your anonymity, by drowning out your traffic. It however only does this inside the network, it doesnt work like an exit node.
By default, it does run a proxy, so that you can access i2p addresses using a browser set up to use it. It also lets you use the proxy to access the internet over i2p, but you have to choose an exit node manually (tho iirc there is one set up as default, which is fairly centralized, but still should be anonymous thanks for the rest of the network). A slight difference from Tor is also that these are protocol level proxies, so you will for example not be able to connect to a clearnet ssh server over these.
*https://geti2p.net/en/about/restrictive-countries
Interesting.
It looks I was close on my understanding, but not quite there. Lol, guess I'll need to bust this back open.