this post was submitted on 29 Aug 2025
697 points (99.7% liked)

Fediverse

36460 readers
2000 users here now

A community to talk about the Fediverse and all it's related services using ActivityPub (Mastodon, Lemmy, KBin, etc).

If you wanted to get help with moderating your own community then head over to !moderators@lemmy.world!

Rules

Learn more at these websites: Join The Fediverse Wiki, Fediverse.info, Wikipedia Page, The Federation Info (Stats), FediDB (Stats), Sub Rehab (Reddit Migration)

founded 2 years ago
MODERATORS
 

Decentralized social network Mastodon says it can’t comply with Mississippi’s age verification law — the same law that saw rival Bluesky pull out of the state — because it doesn’t have the means to do so.

The social non-profit explains that Mastodon doesn’t track its users, which makes it difficult to enforce such legislation. Nor does it want to use IP address-based blocks, as those would unfairly impact people who were traveling, it says.

you are viewing a single comment's thread
view the rest of the comments
[–] moseschrute@lemmy.world 6 points 19 hours ago* (last edited 19 hours ago) (2 children)

I have absolutely no idea what any of that is after tor. I have heard of i2p but I forget

[–] hisao@ani.social 11 points 17 hours ago* (last edited 17 hours ago) (1 children)
  • Tor is optimized for accessing the regular internet anonymously. It uses onion routing with a small number of long-lived relays, and you exit back to the clearnet through an exit node. Hidden services (now called onion services) exist, but they’re secondary to Tor’s main use case.
  • I2P is designed primarily for internal services (called eepsites, torrents, chat, etc.) inside the I2P network itself. It doesn’t rely on exits the way Tor does. It uses garlic routing (a variant of onion routing with bundled messages), and every participant is both a client and a router, making it more peer-to-peer.
[–] irelephant@lemmy.dbzer0.com 3 points 12 hours ago (1 children)

Could you be responsible for what someone else does while your using the network then?

[–] hisao@ani.social 2 points 12 hours ago (1 children)

Only if you're deliberately running an exit node (doing so requires special setup).

[–] irelephant@lemmy.dbzer0.com 1 points 11 hours ago (2 children)
[–] WhyJiffie@sh.itjust.works 1 points 1 hour ago

no, unless you run an outproxy. traffic of other routers that goes trough yours is encrypted in multiple layers, so you are not responsible for what that traffic holds.

[–] hisao@ani.social 2 points 10 hours ago

Pretty much impossible within I2P

[–] other_cat@lemmy.zip 2 points 17 hours ago

Me either, so I'm searching up what I can and bookmarking it to read later. There's always more to learn!