Changes between Version 29 and Version 30 of faq

Aug 20, 2010 1:28:30 PM (10 years ago)


  • faq

    v29 v30  
    77 * __Why do I need I2P?__
    88   * Privacy, security, anonymity. We help whistleblowers, dissidents and people subject to harsh penalties for traceably expressing their freedom of expression. I2P is not so much a program you need, as a network you participate in. We provide you with instant anonymous webmail, anonymous filsharing, anonymous chat, your own anonymous website. Encrypted, safe, free.  If you believe in the right to privacy, you need I2P.
     9   * Privacy, a central tenet of human rights, is seeing a rapid erosion around the world as goverments, in league with big media, seek to infringe privacy in the interests of suppressing copyight infringement. The Hadopi Law in France, the Digital Economies Act in the UK and the proposed firewall in Australia are but 3 examples of increasingly repressive legislation that undermines vital freedoms. In addition, repressive governments that seek to censor the internet and punish those that attempt to express themselves politically are also looking to gain even more control over the internet, and their citizens by extension. If you're a whistleblower or political dissident, the case for I2P is clear. If you're an "average Joe", the freedoms you take for granted today may well be lost tomorrow. Be in no doubt, free flow of information requires your active participation, and by running I2P you're not only helping youself but also others who may have their freedom threatened. If you want to preserve the notion of online privacy, running I2P should be a no-brainer!
    1010 * __I've heard of Tor. What's different about I2P? Should I use both?__
    1111   * I2P and Tor both offer means of communicating anonymously and untraceably on the internet.
    1212   * ''duck: awesome question, needs to be compressed for maximum effect.''
     13   * I2P and Tor are both anonymizing tools that run on a variety of platforms, and serve the interests of similar users. Where Tor sees its primary role as a platform for circumventing censorship on the net at large and providing the tools to evade direct monitoring by governments, ISPs etc, I2P takes a slightly different approach. Where Tor creates a two-tier system of clients and relay nodes, I2P by default puts every user in the role of both client *and* relay. However, unlike Tor, by running I2P there is no risk of takedown notices or worse, since I2P keeps all the traffic hidden and encrypted end-to-end. Tor facilitates access to the net at large, and therefore exposes itself, and its users, to some risk of monitoring and legal intervention. Since everything in I2P happens within I2P, there is no risk of external monitoring by ISP's or governments. In this sense, Tor is more a conventional proxy onto the net at large, whereas I2P is a darknet implementation.
    1414 * __What is the difference between I2P and Freenet, TOR, JonDoe.__
    1515   * ''duck: do people still know Freenet? couple years ago it was the privacy thing that everybody was aware of. any other (regional) candidates?''