Comment on Mastodon says it doesn't 'have the means' to comply with age verification laws
hisao@ani.social 5 weeks agoTor and I2P solve a similar problem (anonymous communication), but they do it in pretty different ways.
- Tor is optimized for accessing the regular internet anonymously. It uses onion routing with a small number of long-lived relays, and you exit back to the clearnet through an exit node. Hidden services (now called onion services) exist, but they’re secondary to Tor’s main use case.
- I2P is designed primarily for internal services (called eepsites, torrents, chat, etc.) inside the I2P network itself. It doesn’t rely on exits the way Tor does. It uses garlic routing (a variant of onion routing with bundled messages), and every participant is both a client and a router, making it more peer-to-peer.
irelephant@lemmy.dbzer0.com 5 weeks ago
Could you be responsible for what someone else does while your using the network then?
hisao@ani.social 5 weeks ago
Only if you’re deliberately running an exit node (doing so requires special setup).
irelephant@lemmy.dbzer0.com 5 weeks ago
Sorry, I meant in i2p
hisao@ani.social 5 weeks ago
Pretty much impossible within I2P
WhyJiffie@sh.itjust.works 5 weeks ago
no, unless you run an outproxy. traffic of other routers that goes trough yours is encrypted in multiple layers, so you are not responsible for what that traffic holds.