💾 Archived View for nicholasjohnson.ch › 2023 › 02 › 21 › i2p-and-tor-need-your-support captured on 2023-03-20 at 17:36:52. Gemini links have been rewritten to link to archived content
-=-=-=-=-=-=-
_ _ _ _ _ _ _ | \| (_)__| |_ ___| |__ _ ___ _ | |___| |_ _ _ ___ ___ _ _ | .` | / _| ' \/ _ \ / _` (_-< | || / _ \ ' \| ' \(_-</ _ \ ' \ |_|\_|_\__|_||_\___/_\__,_/__/ \__/\___/_||_|_||_/__/\___/_||_|
📆 21 Feb 2023 | ⏱️ 1 minute read
Since June 9th of 2022, the Tor network has been undergoing a DDoS attack[1]. Since a couple weeks ago, I2P has also been undergoing a DDoS attack[2]. It's impossible to say for certain who's attacking Tor, but it's likely a nation-state. I don't think it's known who is attacking I2P or if the attacks are related.
Many people rely on these networks for their personal privacy and safety. Until GNUnet[3] or something like it provides a full solution to the weaknesses of the existing network stack, Tor and I2P are the best alternatives. In order to make the attacks more expensive, please join me and run an I2P node[4] or Tor relay[5] if you can.
They're both extremely easy to set up. I've run multiple Tor relays in the past for months at a time. I currently have 3 separate I2P nodes online and I'm working on provisioning a fast new Tor relay. All you have to do is install the software, change a few lines in the configuration file, restart the daemon, and you're good to go. And if you enable automatic updates, the nodes practically maintain themselves.
So why not give it a try?
🔗 1: the Tor network has been undergoing a DDoS attack
🔗 2: I2P has also been undergoing a DDoS attack
Copyright 2019-2023 Nicholas Johnson. CC BY-SA 4.0.