A central theme of Walled Culture the book (free digital versions available) and this blog is that the copyright industry is never satisfied. Now matter how long the term of copyright, publishers a…
Besides how would such a filter even work? I mean dropping all packets to specific IP addresses will lead to chaos with any organization that uses NAT or GCNAT.
Sure, you can circumvent getting your own IP address banned, by using a tunnel, but then your tunnel gateway is the one to get banned instead. End to end encryption won’t solve the problem. Unless we actually setup a system like tor, and don’t leave our own network. But that would be pretty easy to squash, wouldn’t it? I mean a network only set up for piracy, it will get it’s main operators taken down pretty fast.
With I2P each user is a node/router, so it does not rely on central nodes like Tor.
The only issue is it’s slow, because most users don’t allocate/have much bandwidth. Because of it’s garlic routing (similar to Tor’s onion routing) traffic is encrypted multiple times with multiple hops which also impacts throughput and latency.
The good thing is it’s already suppported by qBittorrent (and BiglyBT), but setting it up is a manual process.
Also, qBittorrent doesn’t support DHT over I2P yet, so it’s necessary to use an i2p tracker like tracker2.postman.i2p.
But that would be pretty easy to squash, wouldn’t it? I mean a network only set up for piracy, it will get it’s main operators taken down pretty fast.
As long as there’s reasonable doubt that i2p is only used for piracy, it shouldn’t get blocked. Similarly, Tor isn’t only used for trading drugs, so it mustn’t get blocked by democracies.
you can’t end to end encrypt the traffic destination or else no one will know where to route said traffic. this isn’t tor.
So they’re not checking the contents for copyright violations, but the source and destination.
well yeah, it’s way simpler. you just block the entire website that hosts copyrighted traffic.
IDK why you’re getting down voted, you’re right.
Besides how would such a filter even work? I mean dropping all packets to specific IP addresses will lead to chaos with any organization that uses NAT or GCNAT.
Sure, you can circumvent getting your own IP address banned, by using a tunnel, but then your tunnel gateway is the one to get banned instead. End to end encryption won’t solve the problem. Unless we actually setup a system like tor, and don’t leave our own network. But that would be pretty easy to squash, wouldn’t it? I mean a network only set up for piracy, it will get it’s main operators taken down pretty fast.
With I2P each user is a node/router, so it does not rely on central nodes like Tor.
The only issue is it’s slow, because most users don’t allocate/have much bandwidth. Because of it’s garlic routing (similar to Tor’s onion routing) traffic is encrypted multiple times with multiple hops which also impacts throughput and latency.
The good thing is it’s already suppported by qBittorrent (and BiglyBT), but setting it up is a manual process.
Also, qBittorrent doesn’t support DHT over I2P yet, so it’s necessary to use an i2p tracker like tracker2.postman.i2p.
As long as there’s reasonable doubt that i2p is only used for piracy, it shouldn’t get blocked. Similarly, Tor isn’t only used for trading drugs, so it mustn’t get blocked by democracies.
You’ve already put more thought into it than they have.