mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2025-08-24 06:18:39 -04:00
style: Move Orbot footnote to Alt Networks page
Signed-off-by: redoomed1 <redoomed1@privacyguides.org>
This commit is contained in:
parent
0be42d03c1
commit
59eb7298f0
1 changed files with 2 additions and 0 deletions
|
@ -152,3 +152,5 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default,
|
|||
There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](web-browsing/tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](web-browsing/desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard).
|
||||
|
||||
Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block.
|
||||
|
||||
[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue