From 59eb7298f071c63c8ea228b99f21372f3c29d87e Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 29 Mar 2025 11:59:35 -0700 Subject: [PATCH] style: Move Orbot footnote to Alt Networks page Signed-off-by: redoomed1 --- docs/alternative-networks.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/docs/alternative-networks.md b/docs/alternative-networks.md index bde7d0e8..17ae65d7 100644 --- a/docs/alternative-networks.md +++ b/docs/alternative-networks.md @@ -152,3 +152,5 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](web-browsing/tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](web-browsing/desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people.