Changes between Version 39 and Version 40 of faq


Ignore:
Timestamp:
Aug 20, 2010, 2:18:50 PM (9 years ago)
Author:
anonymous
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • faq

    v39 v40  
    1111 * __I've heard of Tor. What's different about I2P? Should I use both?__
    1212
    13    * I2P and Tor are both anonymizing tools that run on a variety of platforms, and serve the interests of similar users. Where Tor sees its primary role as a platform for circumventing censorship on the net at large and providing the tools to evade direct monitoring by governments, ISPs etc, I2P takes a slightly different approach. Where Tor creates a two-tier system of clients and relay nodes, I2P by default puts every user in the role of both client *and* relay. However, unlike Tor, by running I2P there is no risk of takedown notices or worse, since I2P keeps all the traffic hidden and encrypted end-to-end. Tor facilitates access to the net at large, and therefore exposes itself, and its users, to some risk of monitoring and legal intervention. Since everything in I2P happens within I2P, there is no risk of external monitoring by ISP's or governments. In this sense, Tor is more a conventional proxy onto the net at large, whereas I2P is a darknet implementation.
     13   * I2P and Tor are both anonymizing tools that run on a variety of platforms, and serve the interests of similar users. Where Tor sees its primary role as a platform for circumventing censorship on the net at large and providing the tools to evade direct monitoring by governments, ISPs etc, I2P takes a slightly different approach. Where Tor creates a two-tier system of clients and relay nodes, I2P by default puts every user in the role of both client *and* relay. However, unlike Tor, by running I2P there is no risk of takedown notices or worse, since I2P keeps all the traffic hidden and encrypted end-to-end. Tor facilitates access to the net at large, and therefore exposes itself, and its users, to some risk of monitoring and legal intervention. Since everything in I2P happens within I2P, there is no risk of external monitoring by ISP's or governments. In this sense, Tor is more a conventional proxy onto the net at large, whereas I2P is a darknet implementation. In short, we recommend you use I2P for the darknet it provides, and Tor as a privacy tool to facilitate access to the net at large. They're great companion tools for anyone interested in online privacy.
    1414
    1515 * __What is the difference between I2P and Freenet, TOR, JonDoe.__