💾 Archived View for nicksphere.ch › 2023 › 02 › 21 › i2p-and-tor-need-your-support captured on 2024-05-26 at 14:51:39. Gemini links have been rewritten to link to archived content
⬅️ Previous capture (2024-02-05)
-=-=-=-=-=-=-
_ _ _ _ _ _ _ | \| (_)__| |_ ___| |__ _ ___ _ | |___| |_ _ _ ___ ___ _ _ | .` | / _| ' \/ _ \ / _` (_-< | || / _ \ ' \| ' \(_-</ _ \ ' \ |_|\_|_\__|_||_\___/_\__,_/__/ \__/\___/_||_|_||_/__/\___/_||_|
📆 February 21, 2023 | ⏱️ 1 minute read | 🏷️ computing
Since June 9th of 2022, the Tor network has been undergoing a DDoS attack¹. Since a couple weeks ago, I2P has also been undergoing a DDoS attack². It's impossible to say for certain who's attacking Tor, but it's likely a nation-state. I don't think it's known who is attacking I2P or if the attacks are related.
Many people rely on these networks for their personal privacy and safety. Until GNUnet³ or something like it provides a full solution to the weaknesses of the existing network stack, Tor and I2P are the best alternatives. In order to make the attacks more expensive, please join me and run an I2P node⁴ or Tor relay⁵ if you can.
They're both extremely easy to set up. I've run multiple Tor relays in the past for months at a time. I currently have 3 separate I2P nodes online and I'm working on provisioning a fast new Tor relay. All you have to do is install the software, change a few lines in the configuration file, restart the daemon, and you're good to go. And if you enable automatic updates, the nodes practically maintain themselves.
So why not give it a try?
🔗 [1]: the Tor network has been undergoing a DDoS attack
🔗 [2]: I2P has also been undergoing a DDoS attack
Copyright © 2020-2024 Nicholas Johnson. CC BY-SA 4.0.