• stoy@lemmy.zip
    link
    fedilink
    English
    arrow-up
    48
    ·
    1 day ago

    Tell me that the entity overseeing this infrastructure replied with “lol no”

    • magikmw@lemm.ee
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      1
      ·
      1 day ago

      Which one? Internet is not held by one thing, it’s a network.

  • Mr. Zeus@feddit.org
    link
    fedilink
    English
    arrow-up
    74
    arrow-down
    1
    ·
    2 days ago

    Think about how many times the copyright nazis have tried to crack down on piracy and then imagine how much good that kind of effort could do if they set up sting operations to catch pedos

    • sudoku@programming.dev
      link
      fedilink
      English
      arrow-up
      27
      arrow-down
      5
      ·
      1 day ago

      you can’t end to end encrypt the traffic destination or else no one will know where to route said traffic. this isn’t tor.

        • sudoku@programming.dev
          link
          fedilink
          English
          arrow-up
          2
          ·
          5 hours ago

          well yeah, it’s way simpler. you just block the entire website that hosts copyrighted traffic.

      • BigDanishGuy@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        16
        arrow-down
        1
        ·
        edit-2
        1 day ago

        IDK why you’re getting down voted, you’re right.

        Besides how would such a filter even work? I mean dropping all packets to specific IP addresses will lead to chaos with any organization that uses NAT or GCNAT.

        Sure, you can circumvent getting your own IP address banned, by using a tunnel, but then your tunnel gateway is the one to get banned instead. End to end encryption won’t solve the problem. Unless we actually setup a system like tor, and don’t leave our own network. But that would be pretty easy to squash, wouldn’t it? I mean a network only set up for piracy, it will get it’s main operators taken down pretty fast.

        • Chewy@discuss.tchncs.de
          link
          fedilink
          English
          arrow-up
          8
          ·
          edit-2
          1 day ago

          With I2P each user is a node/router, so it does not rely on central nodes like Tor.

          The only issue is it’s slow, because most users don’t allocate/have much bandwidth. Because of it’s garlic routing (similar to Tor’s onion routing) traffic is encrypted multiple times with multiple hops which also impacts throughput and latency.

          The good thing is it’s already suppported by qBittorrent (and BiglyBT), but setting it up is a manual process.

          Also, qBittorrent doesn’t support DHT over I2P yet, so it’s necessary to use an i2p tracker like tracker2.postman.i2p.

          But that would be pretty easy to squash, wouldn’t it? I mean a network only set up for piracy, it will get it’s main operators taken down pretty fast.

          As long as there’s reasonable doubt that i2p is only used for piracy, it shouldn’t get blocked. Similarly, Tor isn’t only used for trading drugs, so it mustn’t get blocked by democracies.