Quote Originally Posted by n2ize View Post
Can you explain me more about this or a link ? I would like to learn more about this. Particularly since we are facing a future of a censored, limited, slow, overpriced and broken , "pay as you go" Internet. The more I can learn to keep the Internet playing nicely the better.



Hopefully the bleak future of a broken Internet will prompt more and more people to work together to build and roll out more community owned networks. I would gladly contribute to such projects and support and use them. Ultimately the big gun providers may end up shooting themselves in the foot.



Thanks. This is the kind of info that I want and it will be growing in relevance over the upcoming months and years.

Let's also bear in mind that the struggle for a neutral Internet isn't over yet. In fact it has a long fight ahead in upcoming court battles. In time net neutrality may have to be restored.
I'd not use Tor for anything. Period. There was a time when it was an interesting concept. However it's too riddled with exploits at this point.

Best practice is to not use the internet for anything you want to keep private. That's a personal choice based on your perceived need for privacy. Make a measured decision based on your needs.

If you need untraceable end to end communication with others I2P is about the only game in town. There's only one exit node (or one for http and one for https) which are semi reliable. But the network isn't designed to offload the liability for what you do on an exit node operator. It's designed end to end to be a completely anonymous network based on "garlic routing".

One of the more important features of I2P is the e-mail system found within it: it's not only internal but bridges to clearnet. So you can communicate at will without involving clearnet providers as your origin. Additionally, there is an internal torrent system/torrent client/torrent trackers, and the there are two torrent clients that bridge into the network from the clearnet making those torrents available within I2P.

There is more to it as well- but the thing I like most is that the core systems on I2P (torrents, webhosting, etc) remove references to material which may have been derived from the suffering of others (ei child porn Etc...).

Being a non criminal type I like that. Though my use of I2P is academic in nature. Like a hobby. Tor was abandoned long ago due to a much stronger ethical concern about the traffic I would have been carrying.