Just a conversation opener, relax. Only one here shaking a fist in the air is you.
Just a conversation opener, relax. Only one here shaking a fist in the air is you.
I remember reading about I2P back in the day. I am old school. If my old memory serves me correctly, I think there are some vulnerabilities with using I2P instead of say a VPN? (Now, I am going to have to go down that rabbit hole again to refresh my memory.)
Edit to add; The list below describes some of I2P’s main disadvantages.
Complex configuration process: It necessitates a drawn-out installation procedure and specific browser settings.
Must-have logging: The I2P user interface must be logged in for users to access their material.
Severe vulnerabilities: Over 30,000 users were made vulnerable by a zero-day vulnerability that I2P experienced in 2014. Later, a 2017 study found that several more I2P flaws may also be exploited.
A much tiner user base than TOR: As a result, I2P has fewer network nodes and servers and is more open to intrusions.
Less anonymity when browsing indexed sites: I2P does not ensure that users’ browsing of indexed sites is completely anonymous. The use of VPN services may be able to address this issue.
There was an exploit last May, however, if one is not able to fork over money for a VPN, I2P is a good alternative for a free option.
I get the convenience, I really do, and works on every linux distro which is a plus, but I usually stay clear of them because of the bloat. Maybe that is a misconception on my part. I should preference that with the fact I use Arch (btw)…so AUR usually has everything I need.
No gui’s to my knowledge, but there are package managers that can install them, such as Bauh.