this post was submitted on 04 Sep 2025
80 points (98.8% liked)
Privacy
41504 readers
427 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Tor easy to block yes ,i2p much more harder like really harder, in Russian tor blocked ,vpns blocked by DPI system ,but still it possible to bypass it with something like byedpi. But i2p working much harder then just tor or usual http
While i2p's node DB isn't exactly in the clear. There's not so many of us that you can't getting pretty good picture of where it's running.
China's already doing a really good job at blocking it. The protocol is secure in that you can't tell what anybody is doing on it. And the node DB is only somewhat accessible. But that's nothing a little coordinated espionage won't suss out.
Every ISP throws out a couple of honeypots. You don't allow nodes to stay connected to it for long so everybody keeps refreshing it. They're thinking it's a DDOS. It's distributed fingerprinting.
You throw up a node, record its regular traffic, start up I2P and see who it connects to. F with your netem so they connect, but eventually discard that connection because it's unstable. You get to cycle through a bunch of connections that way. Everybody who sends more than a SQL injection script to it is running I2P. You occasionally dump people off of it. New people try to connect. You dump them off of it. You create a list. That particular list isn't worth much, the spread factor is kind of low on the protocol. But you share your IPs with everyone else that's running honeypots. Or you just throw out a lot of honey pots in a lot of places if you're a state actor. Everybody that hits the list gets logged.
We're heading towards some dystopian shit now. If ISPs get to the point where they're allowed to kick you off for suspicion of shady things, the protocol is baked.
It's nearly impossible to identify the traffic. It's fairly impossible to identify the origin or the destination of things from inside the network. It's difficult to block individual connections from happening you're real time. But, if they manage to make unidentified traffic illegal, it's not that hard to detect that I-2p is happening and kick people off wholesale. Once the list is shared, they could just black-ball the IPs on every ISP for any connection.
The real problem is, I'm having a really hard time finding some protocol or method that wouldn't fall to this. You could easily hide some really low bandwidth stuff stego style in audio or video streaming from person to person, like say, forum traffic, but if you wanted to stop people from moving music and videos back and forth, I don't know that you could hide that traffic through any means.
The I2P netDB isn’t a single dumpable list like you’re suggesting. It’s a Kademlia DHT stored across rotating floodfill routers. Floodfills aren’t static — routers get promoted/demoted based on bandwidth, uptime, and capacity — so the view of the network is constantly shifting. A normal router only ever queries small slices of that DHT, meaning you never get the “whole picture” from one vantage point. That’s a deliberate design choice to make enumeration hard. On the traffic side, I2P isn’t just onion-style routing. It uses garlic routing, where multiple encrypted “cloves” (messages) are bundled together into one garlic message. This kills the simple “one in → one out” traffic correlation trick. Add to that the transports: NTCP2 is indistinguishable from normal TLS over TCP, and SSU2 is UDP with full encryption, padding, and replay protection. From a DPI standpoint, it looks like generic encrypted noise — there’s no clean handshake to match on like with old Tor circuits. As for blocking, I2P is decentralized. There are no directory authorities to censor, no fixed bridges to burn. Floodfills are chosen dynamically and constantly refreshed, and peers discover new ones automatically. The bigger the network gets, the harder it is to enumerate and blacklist enough routers to make a dent. Censors can try whack-a-mole, but the distribution effect scales against them: more peers in more ASNs across more countries means higher cost to block. So yes, you can suspect I2P traffic if you really try, but fingerprinting and wholesale blocking don’t scale — the protocol was designed specifically to make both correlation and censorship exponentially harder as adoption grows Details: https://www.youtube.com/watch?v=95hSAMEwrlM
I am well aware of the design and structure, you mentioned I said some things there that I clearly didn't say.
If I2P is outlawed, and there's a strong possibility we'll see that in our lives, and ISP's are told if they let unchecked traffic through they're responsible for legal ramifications. They'll run enough nodes in enough places and terminate enough end user accounts (at the very least in the US) to make people not want to run it.
I don't care if you can't DPI it. If it's on their network, and they start running peers, they will be able to root people out, not everyone, but they don't need everyone. If the ISP's share their data with each other, making that map isn't all that hard.
The floodfills can be secure and ephemeral AF, but P2P traffic, even packaged through garlic still passes through points that can be seen.
The whole design is supersmart, and from a legal stand point it's solid. But when we lose protections of beyond a reasonable doubt become stripped, they'll tear that network apart user by user until no one wants to chance running it.