(i’m also gonna ambush my friends about Signal on sunday and coerce them to download it to get rid of the green bubbles)

  • MaggiWuerze@feddit.org
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    29 days ago

    I still don’t know how I2P would be able to mask where the packets go to or come from, even if they encrypt the contents

    • 31337@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      5
      ·
      29 days ago

      Onion-like routing. It takes multiple hops to get to a destination. Each hop can only decrypt the next destination to send the packet to (i.e. peeling off a layer of the onion).

        • 31337@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          3
          ·
          27 days ago

          Yeah, torrents usually run 100-300KiB/s. I guess not too bad for smaller files. About an hour or three per GB.

      • MaggiWuerze@feddit.org
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        2
        ·
        28 days ago

        Would that keep lawyers from just taking the last ip they get for their frivolous law suits? That way I could get a letter for something I actually didn’t download

        • 31337@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          5
          ·
          28 days ago

          I mean, you can be sued for anything, but it will get thrown out. Like, I guess the MPAA could offer a movie for download, then try to sue the first hop they upload a chunk to, but that really doesn’t make any sense (because they offered it for download in the first place). Furthermore, the first hop(s) aren’t the people that are using the file, and they can’t even read it. If people could successfully sue nodes, then ISPs and postal services could be sued for anything that passes through their networks.

        • Laser@feddit.org
          link
          fedilink
          English
          arrow-up
          2
          ·
          28 days ago

          By how the protocol is structured, it’s impossible for the address a downloader sees to know what the packet they forward actually contains, so they’re just taking the role of an ISP. Also, they don’t know the original source IP.