386
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 20 Oct 2025
386 points (100.0% liked)
Technology
76365 readers
1633 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
I think I’d really need to know how “somewhat” alleviated it is to have any interest, given the status quo is like, a second.
Uh, no clue, that math on that would be very difficult to calculate, exceedingly complicated.
Have you ever been able to accurately predict the actual speed at which you download a torrent thats the size of a whole days worth of your regular internet usage?
Its basically a dynamic mesh network, you could run the math on a 100 different scenarios, get a 100 different results, and also have no clue which scenario is more or less realistic.
The way I2P works is by step one, encrypting your traffic, step two, bundling that into a bigger packet made out of those network-near you's traffic, that then has its own encryption around all that, and then that gets sent somewhere else.
So, upside is, even if your packets are intercepted... its basically impossible to figure out which subpart of the bigger packet is whose.
You only have the keys to your part of that bigger packet.
Downside of all this is that all that packet bundling takes time, and routing is dynamically reconfigured, so... yeah, doing a 'from principles' estimate is... I dunno, find a chaos mathematician specialist for a more precise answer?
Possibly also worth mentioning: You can use I2P as basically something like Tor/a VPN, to access the non I2P net, the normal internet, you do this by using what is called an outproxy.
Theoretically an outproxy could be just giving all its packets right over to the NSA, but again, you've got that kind of encrypted packet sausage going on, and the network is much more complex and distributed than the Tor network's smaller number of more centralized nodes.
What do you recommend to read up on it more? I’ve read the wiki and this.. I’m wondering if there’s more to understand about browsing or connecting with content or like minded people.
I'm wondering the same thing! If you get an answer, would you mind letting me know, if it's not too much trouble? I've read a lot about it, but it still feels like I'm missing/not understanding most of it. That may just me a 'me & my crappy brain' issue, though.