• 1 Post
  • 4 Comments
Joined 20 hours ago
cake
Cake day: July 6th, 2025

help-circle


  • I remember reading about I2P back in the day. I am old school. If my old memory serves me correctly, I think there are some vulnerabilities with using I2P instead of say a VPN? (Now, I am going to have to go down that rabbit hole again to refresh my memory.)

    Edit to add; The list below describes some of I2P’s main disadvantages.

    • Complex configuration process: It necessitates a drawn-out installation procedure and specific browser settings.

    • Must-have logging: The I2P user interface must be logged in for users to access their material.

    • Severe vulnerabilities: Over 30,000 users were made vulnerable by a zero-day vulnerability that I2P experienced in 2014. Later, a 2017 study found that several more I2P flaws may also be exploited.

    • A much tiner user base than TOR: As a result, I2P has fewer network nodes and servers and is more open to intrusions.

    • Less anonymity when browsing indexed sites: I2P does not ensure that users’ browsing of indexed sites is completely anonymous. The use of VPN services may be able to address this issue.

    Source

    There was an exploit last May, however, if one is not able to fork over money for a VPN, I2P is a good alternative for a free option.