Tor is an implementation of i2p. Basically it’s a new protocol that obfuscates everything end to end.
On public trackers you’d be fine since it’s public and ip doesn’t matter. But on private trackers, they usually need your ip to track your activity on the tracker, but with i2p it would be nigh impossible to do so.
I’ve thought about this and wouldn’t it be way more private (and realistically secure given changing IPS) to just use a cryptographical key each login? Like everywhere else on the web?
Tor is an implementation of i2p. Basically it’s a new protocol that obfuscates everything end to end.
On public trackers you’d be fine since it’s public and ip doesn’t matter. But on private trackers, they usually need your ip to track your activity on the tracker, but with i2p it would be nigh impossible to do so.
I’ve thought about this and wouldn’t it be way more private (and realistically secure given changing IPS) to just use a cryptographical key each login? Like everywhere else on the web?
The problem isn’t about logins but tracking the network traffic.
Yeah you’d need to dynamically track login/IP association, but that wouldn’t be particularly hard either
Yeah but private trackers need to adopt this
Most public trackers do this. Schizo’s information is far outdated.