this post was submitted on 28 Nov 2023
111 points (97.4% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
54609 readers
273 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Tor is an implementation of i2p. Basically it's a new protocol that obfuscates everything end to end.
On public trackers you'd be fine since it's public and ip doesn't matter. But on private trackers, they usually need your ip to track your activity on the tracker, but with i2p it would be nigh impossible to do so.
I've thought about this and wouldn't it be way more private (and realistically secure given changing IPS) to just use a cryptographical key each login? Like everywhere else on the web?
The problem isn't about logins but tracking the network traffic.
Yeah you'd need to dynamically track login/IP association, but that wouldn't be particularly hard either
Yeah but private trackers need to adopt this
Most public trackers do this. Schizo's information is far outdated.