After the Mullvad fiasco I decided to stop using VPNs all together, since port forwarding is always going to be a problem on all of them, if you read the reasons why Mullvad had to shut down that service.

There is a better way using i2p which conceals your IP and makes it impossible for anyone to know what or if you’re downloading at all! No DMCA notices, no problem.

I wrote this small guide to another comment and figured I’d share it in its own post since I’m seeing so many people ask for VPN recommendations.

So there are 2 main implementations of i2p. First is the main Dev’s Java client here https://geti2p.net/en/download

The other is i2pd, which is C++.

I use the Java one personally but both would work. Someone posted back on reddit a guide on /r/i2p for qbittorrent, which is what I use now for this too. The guide was shared as a public torrent you can download with this info hash: 3f1d51095f9b116739172c1bced149acf2b10692

Use that hash with any of the various public trackers and you should be able to download that guide.

But if you just want a basic setup, that Java client comes with i2psnark, which is a Bittorrent client already setup.

The only other thing you want to do is go and search the biggest tracker for stuff, which is called PaTracker, Postman’s tracker. http://tracker2.postman.i2p, only accessible from i2p itself, which you’ll need to have setup and running first to view.

This tracker needs more seeders and uploaders in general, and by improving those things service for everyone is better. So the more the merrier.

Thanks! Feel free to ask any questions, there also might be other people who use i2p now for torrenting. I’m sure they’ll help too.

  • m3enzo@kbin.social
    link
    fedilink
    arrow-up
    5
    ·
    1 year ago

    I’m looking up I2P vs VPN and people are saying that I2P cannot replace VPN but I fail to understand why. Can I get some more insight to that?

    • JoeKrogan@lemmy.world
      link
      fedilink
      arrow-up
      6
      ·
      1 year ago

      I2p is a closed network where everyone participates and using cryptography packets are encrypted so so only the destination can reason them. All packets are sent through short lived tunnels which are connections of various nodes in the network that change at every so often.

      You traffic never hits the main internet. Its a full darknet with a torrent network system , email, websites, private encrypted messaging and more built on top of it.

      So they are all encrypted. Nobody knows the IP of anyone else

    • karce@wizanons.devOP
      link
      fedilink
      arrow-up
      5
      ·
      1 year ago

      I think the only use-case maybe not covered is finding torrents that aren’t uploaded to the I2P tracker yet. They need to be cross-seeded from people who originally uploaded them or from people downloading them from the clearnet to be available.

      An example of this is anime. There is significantly less anime available on i2p currently than there are on sites like nyaa.si. People can cross-seed these torrents to make them available on i2p. I do that, for instance. But other than that I can’t think of any other use case that isn’t covered.