Skip to content

Automatic translation from Russian to English. It may contain inaccuracies.

Posts

I promised - I’m telling you 🫡 Today we are talking about TOR and I2P. Two tools, two ap…

May 11, 2025 at 11:26 AMMax Knyazev is typing…Telegram mirror
I promised - I tell you 🫡

Today we are talking about TOR and I2P. Two tools, two approaches, two philosophies. And yes, these are the very technologies that underlie the darknet. In one of posts I promised that I would tell you more about them. Well, the moment has come 🥂

TOR is a technology that encrypts your Internet traffic and sends it through a chain of random nodes around the world


Imagine: you send a letter, but before it reaches the recipient, it passes through three random intermediaries, each of whom knows only the one from whom he received the letter and the one to whom he should pass it on. None of them knows the entire chain - and this is the key point. TOR creates the same routing, only for your data. The site you open does not see your real IP, and you yourself do not see which countries and servers your requests went through 😳

The whole scheme is called "onion routing" - because, like in a bow, everything is built in layers. Each node removes one layer of encryption until it eventually reaches the content

I2P is generally a little different. Unlike TOR, it is primarily built around an internal, isolated infrastructure. This is a full-fledged decentralized network in which users communicate only with each other


That is, if TOR is a way to anonymously access the Internet, then I2P is a separate Internet in which all communication takes place within the network. Instead .onion used here .i2p . Everything is encrypted, routes are built in both directions ( incoming and outgoing tunnels ), and there are no “exit nodes” outside by default 😱

In practice, TOR is easier for a beginner. Just install the browser and start using it. I2P requires more complex setup and understanding, but provides greater anonymity. TOR is suitable for those who value access to information, I2P is for those who value secure internal communication

Both projects are open source, and behind each there is a community that has been developing for years 💪

Yes, both technologies are actively used on the darknet. And, yes, in addition to all the criminal that goes there, there are also legitimate scenarios ( journalists, activists, human rights defenders, just people living in countries with limited access to information )

Anonymity in itself is not evil. It all depends on whose hands it ends up. I am deeply convinced that the right to privacy is not a privilege, but a basic digital necessity. of the world. But this is where an ethical conflict begins. 👇

For some, anonymity is protection, for others it is a cover. And the more you are in this topic, the more you begin to understand how ambiguous everything is.

Write in the comments what you think about anonymity on the Internet. Is this a benefit or a potential threat? Do you think a person should have the right to be invisible online? 🛡

#information_security
Open original post on Telegram

Connection graph

How this work connects to others

No explicit connections have been configured for this work yet. You can still open the full graph or the timeline of all works.

Hover over a line to see what connects one work to another.

Use the mouse wheel to zoom the graph and drag it like a map.

Post
100%

Discussion

Comments

Comments are available only to confirmed email subscribers. No separate registration or password is required: a magic link opens a comment session.

Join the discussion

Enter the same email that you already used for your site subscription. We will send you a magic link to open comments on this device.

There are no approved comments here yet.