Yea, i2p is slightly more involved than just starting up tor browser, but its not that bad. The real problem for this case is that it doesnt have exit nodes built into the protocol, so getting to the internet is a bit harder.
- 0 Posts
- 10 Comments
Joined 2 years ago
Cake day: June 15th, 2023
You are not logged in. If you use a Fediverse account that is able to follow users, you can follow this user.
What should it do instead? I think the only reasonable action would be not showing it if the licence file was changed.
Is this post about Github seemingly detecting an incorrect licence? The project was relicenced in a later commit, so I dont think this behavior is entirely wrong.
WIPocket@lemmy.worldto AnarchyChess@sopuli.xyz•week 2: top 7 comments get played in a random order, legal or not1·1 year agodeleted by creator
Why would banking be an issue? I get that its a target, but I really would expect a bank to take care of their TLS.
Wdym too late? Is there something you could have done if you knew “soon enough”?
Do they have neurotoxin? Bet they have neurotoxin.
WIPocket@lemmy.worldto Showerthoughts@lemmy.world•If a machine is never 100% efficient transforming energy into work because part of the energy is converted into heat, does it mean an electric heater is 100% efficient? [@showerthoughts@lemmy.world](h6·1 year agoI so want this to be true, but dont they produce radio waves?
WIPocket@lemmy.worldto Very Real Tech Pics@lemmy.world•I have like 100+ tabs on Firefox mobile and it gives up counting -- :D50·1 year agoIsnt that Chrome? Firefox shows an infinity sign past 100.
Yep, almost. Every* i2p node also acts as a relay, which not only helps the network, but also your anonymity, by drowning out your traffic. It however only does this inside the network, it doesnt work like an exit node.
By default, it does run a proxy, so that you can access i2p addresses using a browser set up to use it. It also lets you use the proxy to access the internet over i2p, but you have to choose an exit node manually (tho iirc there is one set up as default, which is fairly centralized, but still should be anonymous thanks for the rest of the network). A slight difference from Tor is also that these are protocol level proxies, so you will for example not be able to connect to a clearnet ssh server over these.
*https://geti2p.net/en/about/restrictive-countries