I think this article is generated by AI.
Fake CVE numbers. For example, “critical vulnerability (CVE-2021-34527) revealed that Tor Browser leaked real IPs under certain configurations”, but if you look it up, it is about Windows Print Spooler.
I2P sites also look fake.
The debian package is calledi2pd, notpurplei2pCould be. I didn’t write it, just passed it on.
@silverpill >Developers in China use it to distribute tools and circumvent the Great Firewall.
Tbh, Chinese developers typically use shadowsocks or vmess protocol proxies; they do not use i2p. Futhermore, no one in China knows about i2p, even though its usability is better than Tor.
“No one”? Hrm. Press X.
Unlike Tor, which allows access to both its hidden services and the regular web, I2P is inward-facing.
You can access clearnet through i2p.
Freenet, once a peer contender, faded after CVE-2019-13123.
It’s Hyphanet now…
Is it still an FBI honeypot hyphanet?
Dunno… sources?
vetted sources, ofc.
Wikipedia in the vulnerabilities section court case in the Peel Region of Ontario, Canada R. v. Owen, 2017 ONCJ 729 (CanLII), illustrated that law enforcement do in fact have a presence, after Peel Regional Police located who had been downloading illegal material on the Freenet network.[57] The court decision indicates that a Canadian Law Enforcement agency operates nodes running modified Freenet software in the hope of determining who is requesting illegal material.
The modified bit is worrying, the rest is BAU, i’m sure a lot of Tor exit notes are in a DC in Utah.
deleted by creator






