Comment on Mastodon says it doesn't 'have the means' to comply with age verification laws
hisao@ani.social 1 day agoTor and I2P solve a similar problem (anonymous communication), but they do it in pretty different ways.
- Tor is optimized for accessing the regular internet anonymously. It uses onion routing with a small number of long-lived relays, and you exit back to the clearnet through an exit node. Hidden services (now called onion services) exist, but they’re secondary to Tor’s main use case.
- I2P is designed primarily for internal services (called eepsites, torrents, chat, etc.) inside the I2P network itself. It doesn’t rely on exits the way Tor does. It uses garlic routing (a variant of onion routing with bundled messages), and every participant is both a client and a router, making it more peer-to-peer.
irelephant@lemmy.dbzer0.com 21 hours ago
Could you be responsible for what someone else does while your using the network then?
hisao@ani.social 20 hours ago
Only if you’re deliberately running an exit node (doing so requires special setup).
irelephant@lemmy.dbzer0.com 19 hours ago
Sorry, I meant in i2p
WhyJiffie@sh.itjust.works 9 hours ago
no, unless you run an outproxy. traffic of other routers that goes trough yours is encrypted in multiple layers, so you are not responsible for what that traffic holds.
hisao@ani.social 18 hours ago
Pretty much impossible within I2P